Course 1- Foundations of Cybersecurity Flashcards

Learn course 1 terms

1
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

Any circumstance or event that can negatively impact assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat actor

A

Any person or group who presents a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transferable skills

A

Skills from other areas that can apply to different careers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adversarial artificial intelligence (AI)

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Email Compromise (BEC)

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISSP

A

Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A

Software designed to harm devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Password attack

A

An attempt to access password secured devices, systems, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Social media phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack.

25
Spear phishing
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source.
26
Supply-chain attack
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.
27
USB baiting
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.
28
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
29
Watering hole attack
A type of attack when a threat actor compromises a website frequently visited by a specific group of users.
30
Asset
An item perceived as having value to an organization.
31
Availability
The idea that data is accessible to those who are authorized to access it.
32
Compliance
The process of adhering to internal standards and external regulations.
33
Confidentiality
The idea that only authorized users can access specific assets or data.
34
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies.
35
Hacktivist
A person who uses hacking to achieve a political goal.
36
Health Insurance Portability and Accountability Act (HIPAA)
A U.S. federal law established to protect patients' health information.
37
Integrity
The idea that the data is correct, authentic, and reliable.
38
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
39
Privacy protection
The act of safeguarding personal information from unauthorized use.
40
Protected health information (PHI)
Information that relates to the past, present, or future physical or mental health or condition of an individual.
41
Security architecture
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats.
42
Security controls
Safeguards designed to reduce specific security risks.
43
Security ethics
Guidelines for making appropriate decisions as a security professional.
44
Security frameworks
Guidelines used for building plans to help mitigate risk and threats to data and privacy.
45
Security governance
Practices that help support, define, and direct security efforts of an organization.
46
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines.
47
Antivirus software
A software program used to prevent, detect, and eliminate malware and viruses.
48
Database
An organized collection of information or data.
49
Data point
A specific piece of information.
50
Intrusion detection system (IDS)
An application that monitors system activity and alerts on possible intrusions.
51
Linux
An open-source operating system.
52
Log
A record of events that occur within an organization’s systems.
53
Network protocol analyzer (packet sniffer)
A tool designed to capture and analyze data traffic within a network.
54
Order of volatility
A sequence outlining the order of data that must be preserved from first to last.
55
Programming
A process that can be used to create a specific set of instructions for a computer to execute tasks.
56
Protecting and preserving evidence
The process of properly working with fragile and volatile digital evidence.
57
Security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization.
58
SQL (Structured Query Language)
A query language used to create, interact with, and request information from a database.