Google Cyber Security - Glossary - All Flashcards
The full file path, which starts from the root
Absolute file path
Security controls that manage access, authorization, and accountability of information
Access controls
A type of attack where data packets are manipulated in transit
Active packet sniffing
A network protocol used to determine the MAC address of the next router or device on the path
Address Resolution Protocol (ARP)
An instance when a threat actor maintains unauthorized access to a system for an extended period of time
Advanced persistent threat (APT)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adversarial artificial intelligence (AI)
A type of legitimate software that is sometimes used to display digital advertisements in applications
Adware
A set of rules used to solve a problem
Algorithm
The investigation and validation of alerts
Analysis
A technique where attackers impersonate customer service representatives on social media
Angler phishing
A detection method that identifies abnormal behavior
Anomaly-based analysis
A software program used to prevent, detect, and eliminate malware and viruses
Antivirus software
A program that performs a specific task
Application
A small block of encrypted code that contains information about a user
Application programming interface (API) token
Specific information needed by a command
Argument (Linux)
The data brought into a function when it is called
Argument (Python)
A data type that stores data in a comma-separated ordered list
Array
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
Assess
An item perceived as having value to an organization
Asset
The practice of labeling assets based on sensitivity and importance to an organization
Asset classification
A catalog of assets that need to be protected
Asset inventory
The process of tracking assets and the risks that affect them
Asset management
The use of a public and private key pair for encryption and decryption of data
Asymmetric encryption
All the potential vulnerabilities that a threat actor could exploit
Attack surface