Terms Flashcards

(28 cards)

1
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sensitive personally identifiable information (SPII

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance

A

Compliance is the process of adhering to internal standards and external regulations. It enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

A software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonates a known source to obtain a financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social media phishing

A

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

16
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

17
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

18
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

19
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

20
Q

Password attack

A

An attempt to access password-secured devices, systems, networks, or data

21
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

22
Q

Security frameworks

A

Guidelines that are used for building plans to help mitigate risks and threats to data and privacy

23
Q

security controls

A

They are safeguards designed to reduce specific security risks

24
Privacy protection
means safeguarding personal information from unauthorized use
25
Laws
rules that are recognized by a community and enforced by a governing entity.
26
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
27
Security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization