Terminology Flashcards

1
Q

Week 1 Terminology

Cybersecurity (or security):

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Week 1 Terminology

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Week 1 Terminology

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Week 1 Terminology

Network security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Week 1 Terminology

Personally identifiable information (PII):

A

Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Week 1 Terminology

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Week 1 Terminology

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Week 1 Terminology

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Week 1 Terminology

Threat

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Week 1 Terminology

Threat actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Week 1 Terminology

Transferable skills

A

Skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Week 2 Terminology

Adversarial artificial intelligence (AI):

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Week 2 Terminology

Business Email Compromise (BEC)

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Week 2 Terminology

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Week 2 Terminology

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended reci

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Week 2 Terminology

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

17
Q

Week 2 Terminology

Malware

A

Software designed to harm devices or networks

18
Q

Week 2 Terminology

Password attack

A

An attempt to access password secured devices, systems, networks, or data

19
Q

Week 2 Terminology

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

20
Q

Week 2 Terminology

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed

21
Q

Week 2 Terminology

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

22
Q

Week 2 Terminology

Social engineering

A

manipulation technique that exploits human error to gain private information, access, or valuables

23
Q

Week 2 Terminology

Social media phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

24
Q

Week 2 Terminology

Spear phishing

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

25
Q

Week 2 Terminology

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

26
Q

Week 2 Terminology

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

27
Q

Week 2 Terminology

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

28
Q

Week 2 Terminology

Watering hole attack

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users