Course 1 Flashcards
Foundations of Cybersecurity
Adversarial artificial intelligence
A technique that manipulates artificial intelligence
(AI) and machine learning (ML) technology to conduct attacks more efficiently
Antivirus software
A software program used to prevent, detect, and eliminate
malware and viruses
Asset
An item perceived as having value to an organization
Availability
The idea that data is accessible to those who are authorized to access it
Business Email Compromise (BEC)
A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage
Cloud security
The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users
Compliance
The process of adhering to internal standards and external regulations
Computer virus
Malicious code written to interfere with computer operations and
cause damage to data and software
Confidentiality
Only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how
organizations consider risk when setting up systems and security policies
Cryptographic attack
An attack that affects secure forms of communication
between a sender and intended recipient
Cybersecurity (or security)
The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation
Database
An organized collection of information or data
Data point
A specific piece of information
Hacker
Any person who uses computers to gain access to computer systems,
networks, or data
Hacktivist
A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA)
A U.S. federal law
established to protect patients’ health information
Integrity
The idea that the data is correct, authentic, and reliable
Internal threat
A current or former employee, external vendor, or trusted partner who poses a security risk
Intrusion detection system (IDS)
An application that monitors system activity and alerts on possible intrusions
Linux
An open-source operating system
Log
A record of events that occur within an organization’s systems
National Institute of Standards and Technology (NIST) Cyber Security Framework
(CSF)
A voluntary framework that consists of standards, guidelines, and best
practices to manage cybersecurity risk