Course 1 Flashcards
Adversarial artificial intelligence (AI)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Antivirus software
A software program used to prevent, detect, and eliminate malware and viruses
Asset
An item perceived as having value to an organization
Authentication
The process of verifying who someone is
Availability
The idea that data is accessible to those who are authorized to access it
Business Email Compromise (BEC)
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
Computer virus
Malicious code written to interfere with computer operations and cause damage to data and software
Confidentiality
Only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
Cryptographic attack
An attack that affects secure forms of communication between a sender and intended recipient
Cybersecurity (or security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Database
An organized collection of information or data
Data point
A specific piece of information
Hacker
Any person or group who uses computers to gain unauthorized access to data
Hacktivist
A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA)
A U.S. federal law established to protect patients’ health information
Integrity
The idea that the data is correct, authentic, and reliable
Internal threat
A current or former employee, external vendor, or trusted partner who poses a security risk
Intrusion detection system (IDS)
An application that monitors system activity and alerts on possible intrusions
Linux
An open-source operating system
Log
A record of events that occur within an organization’s systems
Malware
Software designed to harm devices or networks