course 1 glossary Flashcards

1
Q

adversarial artificial intelligence

A

a technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

antivirus software

A

a software program used to prevent, detect, and eliminate malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asset

A

an item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

availability

A

the idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

business email compromise (BEC)

A

a type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cloud security

A

the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

compliance

A

the process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

computer virus

A

malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

confidentiality

A

only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

confidentiality,integrity, and availability, (CIA) triad

A

the idea that the data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cryptographic attack

A

an attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cybersecurity (or security)

A

the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

database

A

an organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data point

A

a specific piece of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hacker

A

any person who used computers to gain access to computer systems,networks,or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hacktivist

A

a person who used hacking to achieve political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

health insurance portability and accountability (HIPAA)

A

a U.S. federal law established to protect patients health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

integrity

A

the idea that the data is correct, suthenti

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

internal threat

A

a current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

intrusion detection system (IDS)

A

an application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

linux

A

an open-source operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

log

A

a record of events that occur within an organization’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

malware

A

software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

national institute of standards and technology (NIST) cyber security framework (CSF)

A

a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

25
Q

network protocol analyzer (packet sniffer)

A

a tool designed to capture and analyze data traffic within a network

26
Q

network security

A

the practice of keeping an organizations network infrastructure secure from unauthorized access

27
Q

open web application security project (OWASP)

A

a non profit organization focused on improving software security

28
Q

order of volatility

A

a sequence outlining the order of data that must be preserved from first to last

29
Q

password attack

A

an attempt to access password secured devices, systems, networks, or data

30
Q

personally identifiable information (PII)

A

any information used to infer an individual’s identity

31
Q

phishing

A

the use of digits, communications to trick people into revealing sensitive data or deploying malicious software

32
Q

physical attack

A

a security incident that affects not only digital but also physical environments where the incident is deployed

33
Q

physical social engineering

A

an attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

34
Q

privacy protection

A

the act of safeguarding personal information from unauthorized use

35
Q

programming

A

a process that can be used to create specific set of instruments for a computer to execute tasks

36
Q

protected health information (PHI)

A

information that relates to the past, present, or future physical or mental health or condition of an individual

37
Q

protecting and preserving evidence

A

the process of properly working with fragile and volatile digital evidence

38
Q

security architecture

A

a type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

39
Q

security controls

A

safeguards designed to reduce specific security risks

40
Q

security ethics

A

guidelines for making appropriate decisions as a security professional

41
Q

security frameworks

A

guidelines used for building plans to help mitigate risk and threats to data and privacy

42
Q

security governance

A

practices that help support, define, and direct security efforts of an organization

43
Q

security information and event management (SIEM)

A

an application that collects and analyzed log data to monitor critical activities in an organization

44
Q

security posture

A

an organizations ability to manage its defense of critical assets and data and react to change

45
Q

sensitive personally identifiable information (SPII)

A

a specific type of PII that falls under stricter handling guidelines

46
Q

social engineering

A

a manipulation technique that exploits human error to gain private information, access, or valuables

47
Q

social media phishing

A

a type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

48
Q

spear phishing

A

a malicious email attack targeting a specific user of group of users, appearing to originate from a trusted source

49
Q

SQL (Structured Query Language)

A

a programming language used to create, interact with, and request information from a database

50
Q

supply chain attack

A

an attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

51
Q

technical skills

A

skills that require knowledge of specific tools, procedures, and policies

52
Q

threat

A

any circumstance or event that can negatively impact assets

53
Q

threat actor

A

any person or group who presents a security risk

54
Q

transferable skills

A

skills from other areas that can apply to different careers

55
Q

USB baiting

A

an attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

56
Q

virus

A

refer to “computer virus”

57
Q

vishing

A

the exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

58
Q

watering hole attack

A

a type of attack when a threat actor compromises a website frequently visited by a specific group of users