Cyber Flashcards
Absolute file path
While diagnosing a server issue in a Linux environment, an engineer references /etc/apache2/apache2.conf to specify the entire location beginning at root. This ensures pinpoint accuracy, preventing mistakes that arise when relative paths lead to overlooked or duplicate directories.
Access controls
Within a financial institution, only certain employees handle loan applications. Privilege settings and password policies prevent unauthorized team members from accessing sensitive records, demonstrating how organizational structure can reinforce data protection.
Active packet sniffing
An attacker stealthily intercepts and modifies traffic between a buyer’s browser and the online store. Payment details are altered in-flight, illustrating how unprotected channels can be manipulated to redirect funds or steal information.
Address Resolution Protocol (ARP)
Before a workstation sends data over a network, it needs the physical identifier of the next router. A lookup matches the numeric network address to the hardware address, ensuring that packets flow to the intended destination without confusion.
Advanced persistent threat (APT)
A rogue actor quietly infiltrates a large corporation’s data center, siphoning off confidential research for months. The intruder stays hidden by blending into normal traffic patterns, prolonging the breach and maximizing the data theft.
Adversarial artificial intelligence (AI)
A machine-learning email filter is gradually fed deceptive training examples by malicious entities. Over time, the filter flags fewer scam emails, revealing how subtle interference can sabotage advanced automated defenses.
Adware
A free media player continuously launches pop-up banners and embedded offers whenever it’s opened. Users grow frustrated with the frequent interruptions, unaware that these on-screen promotions generate revenue for the software’s distributor.
Algorithm
A mapping service calculates the optimal driving route by weighing real-time congestion, planned road closures, and distance. This step-by-step logic systematically chooses the path that balances speed and convenience under given conditions.
Analysis
A security professional receives an off-hours notification about multiple account lockouts. Delving into logs, traffic captures, and error messages helps uncover whether an automated script or a determined threat actor is probing the system.
Angler phishing
A criminal masquerades as social media support for a well-known entertainment platform, assuring worried users they can fix billing issues if they provide credit card details. The personal touch convinces many victims that the messages are genuine.
Anomaly-based analysis
A financial service flags a credit card purchase for review when it doesn’t match the owner’s habitual spending pattern. Rather than relying on known attack signatures, the system spots outliers that might indicate fraudulent use.
Antivirus software
A computer utility constantly watches incoming files and background processes, erasing any discovered malicious code. This routine scanning keeps everyday operations safer by halting harmful executables before they spread.
Application
A user launches a dedicated program on their device to edit images for a marketing brochure. This tool focuses on a specific task—modifying graphics—offering features unavailable in more general-purpose software.
Application programming interface (API) token
A weather service grants a unique encrypted code to an app developer, letting the app retrieve the latest forecast data. Each request is verified with this code to confirm it’s coming from a trusted source.
Argument (Linux)
Someone inputs ls -l /var/www/html to see file details in the web directory. The program uses /var/www/html as the subject of the listing, interpreting it as the location being examined.
Argument (Python)
A custom function in a script might be called with add_score(10, 5). The function’s logic processes the numeric details passed in, adjusting a running total accordingly.
Array
A video game tracks the five best players in a structured list, ensuring quick access to scores and enabling easy updates whenever a new player surpasses a previous record.
Assess (NIST RMF)
An enterprise installs intrusion detection systems and verifies if they properly detect simulated attacks. Logs and test results show whether each control is effectively blocking potential threats before sign-off.
Asset
A personal smartphone containing messages, photos, and credentials demands protective measures at both the software and physical levels—highlighting how essential resources deserve thorough safeguarding.
Asset classification
An IT department labels newly developed source code as “Restricted” while routine memos remain “Public.” This labeling process guides security budgets and safety measures based on risk and confidentiality.
Asset inventory
A hospital catalogs all electronic patient record systems, diagnostic devices, and lab computers, maintaining an organized list. This helps identify which equipment needs critical updates or security patches first.
Asset management
A corporation monitors the current status of every server, laptop, and specialized tool, noting which ones pose vulnerabilities or need attention. Frequent reviews enable faster responses to evolving threats.
Asymmetric encryption
An individual sends sensitive data using an open, shareable locking mechanism, while the intended reader alone holds the secret key for unlocking. This separation of locks and keys ensures that only the correct recipient can decode messages.
Attack surface
A local shop sets up an online storefront, remote invoicing, and a cloud-based point-of-sale system. Each new feature potentially increases the ways intruders can break in, warranting thorough protective steps.
Attack tree
A tech company visualizes every possible weakness leading to customer data exposure, starting from phishing employee credentials to physically infiltrating the data center. Each path reveals how attackers might progress.
Attack vectors
Cybercriminals might slip malicious files into a free download, craft believable email scams, or trick employees with public Wi-Fi. Each trick provides an entry point for covertly accessing protected environments.
Authentication
A secure portal requests a username, password, and face recognition. The combination fortifies identity verification, making unauthorized logins much harder.
Authorization
A logged-in team member only sees certain options in the internal dashboard, while higher-level roles unlock advanced menus. Access boundaries reflect the functional separation of responsibilities.
Authorize (NIST RMF)
Executive leaders review a comprehensive risk analysis for a new payment platform and formally approve it. This sign-off acknowledges both the benefits and the associated liabilities.
Automation
A script closes stale support requests automatically if users don’t respond, reducing repetitive tasks for human agents. Fewer manual chores free time for more complex problems.
Availability
An online bookstore invests in redundant database clusters, balancing requests across several servers. Even if one goes offline, buyers can continue placing orders without interruption.
Baiting
A USB stick labeled “Executive Salaries” is left in a break room, tempting a curious staff member to plug it in. Once opened, the device executes hidden malicious code on the host computer.
Bandwidth
Users in a crowded office notice slower connections whenever large data backups run. The pipeline capacity gets saturated, creating performance lags for everyone sharing the same link.
Baseline configuration (baseline image)
New servers are rolled out using a standard template that has pre-installed security updates and necessary software. This consistency ensures each system aligns with the company’s vetted setup.
Bash
In a Unix-like environment, a professional types commands to navigate directories, manage files, and run scripts. The input is parsed and executed, offering powerful text-based control over the system.
Basic auth
A website prompts for a username and password, transmitting them in a simpler, less secure format without advanced cryptographic layers. This approach is direct but often replaced with stronger safeguards.
Basic Input/Output System (BIOS)
An older machine runs a tiny program after powering on, instructing hardware to find where the main operating system resides. This initial routine is critical for a successful startup sequence.
Biometrics
A traveler at an airport gate confirms identity using a unique facial scan, streamlining the boarding process and cutting down on manual ID checks.
Bit
A single storage element in a digital device can only be on or off, signifying the most fundamental data building block in computing.
Boolean data
An access-control system has a switch that’s either on or off, marking whether a door is locked and reinforcing straightforward, yes/no logic.
Bootloader
When powering a smartphone, a minimal program starts running. It prepares the environment by checking components and then passes control to the main system software.
Botnet
A large number of infected personal devices worldwide respond to hidden commands, sending spam or launching massive traffic floods upon a single orchestrated instruction.
Bracket notation
In a Python list, selecting index [3] retrieves the fourth element. This indexing method organizes data retrieval in a predictable way.
Broken chain of custody
After seizing a suspect’s computer drive, an investigator forgets to log where it was kept overnight. Missing records create doubt about any evidence obtained.
Brute force attack
A hacker repeatedly tries every conceivable password variation, hoping that a successful guess eventually grants entry to an account.
Bug bounty
A company publicly invites ethical hackers to find flaws, rewarding them with cash or recognition. This method helps identify holes before malicious actors discover them.
Built-in function
A programming environment provides shortcuts—like quickly measuring a string’s length—enabling rapid coding without reinventing common operations.
Business continuity
A natural disaster knocks out power across the city, but alternate datacenters keep critical applications running. Customers experience minimal service disruption thanks to layered resilience.
Business continuity plan (BCP)
A well-documented approach details backup office spaces and fallback technology solutions, allowing a seamless shift if the primary site becomes unreachable.
Business Email Compromise (BEC)
An accountant receives an urgent request to transfer funds, seemingly from the CEO. The message includes just enough personal detail to appear genuine, pressuring quick action.
Categorize (NIST RMF)
An online retailer identifies which servers are vital for processing payments and which systems only contain marketing data. Sensitivity levels guide where to dedicate the most robust defenses.
CentOS
A firm installs a freely available enterprise-grade server environment that mirrors a commercial product’s reliability. They focus on open-source benefits and stable long-term support.
Central Processing Unit (CPU)
A user with multiple browser tabs, video editing, and data modeling open simultaneously relies on a core component that orchestrates and executes instructions at blazing speed.
Chain of custody
Investigators place sealed evidence in a labeled bag, logging the time and name of each person who handles it. This rigorous audit trail maintains the integrity of what’s collected.
Chronicle
A global corporation pipes all system logs into a powerful cloud-based console, letting security teams analyze suspicious patterns or correlate events across many regions in seconds.
Cipher
A chat app scrambles messages so that, without the decoding steps, the text appears meaningless. The method ensures eavesdroppers see only jumbled content.
Cloud-based firewalls
A small company relies on a hosted security layer that scans and filters traffic through a provider’s data center, offloading the need for on-premise appliances.
Cloud computing
Engineers move from in-house hardware to remote hosted servers, paying only for the resources actually used. This flexibility saves costs and simplifies upgrades.
Cloud network
Personal photos and documents stored on an internet-accessible service become reachable from any device, removing the dependence on physical storage mediums.
Cloud security
A financial startup configures restricted roles, applies encryption, and monitors logs in a large hosting environment, ensuring customers’ data stays confidential despite the shared platform.
Command
A user at the console types mkdir projectDocs, instructing the environment to make a new folder for organizing files.
Command and control (C2)
Compromised machines phone home to a hidden hub, awaiting fresh directives that could instruct them to launch attacks, steal data, or remain silent.
Command-line interface (CLI)
In a server room, text-based instructions allow precise file manipulation, system monitoring, and script automation without needing a graphical display.
Comment
Within a code file, short annotations clarify purpose or logic, but don’t impact how the computer ultimately executes operations.
Common Event Format (CEF)
A security platform receives logs with a consistent structure, including time, source, and event details, making it simpler to filter and analyze across diverse systems.
Common Vulnerabilities and Exposures (CVE®) list
A widely recognized index assigns numbers to newly found software weaknesses, letting teams track critical issues systematically.
Common Vulnerability Scoring System (CVSS)
A software flaw that enables remote takeover might earn a near-maximum severity rating, motivating teams to fix it before lower-rated items.
Compliance
A healthcare organization employs strict data handling protocols and encryption to align with applicable privacy mandates, ensuring legal and ethical standards are met.
Computer security incident response teams (CSIRT)
A specialized group steps in when malware strikes, investigating the extent, closing gaps, and helping the business resume normal operations.
Computer virus
A self-replicating file infiltrates various folders, attaching its destructive payload to unsuspecting programs until it’s detected or removed.
Conditional statement
A code block checks if an employee’s role is “manager,” then grants them access to advanced analytics. Otherwise, the system restricts them to basic views.
Confidentiality
A corporate portal ensures only authorized people can see internal sales figures. Encryption and strict credential checks keep outside eyes away.
Confidential data
Engineers store design prototypes in a locked lab and limit access to senior staff. Revealing such materials could undermine competitive advantage.
Confidentiality, integrity, availability (CIA) triad
A secure hospital system only shows patient records to doctors, guards info from tampering, and ensures records stay online for medical emergencies.
Configuration file
A text entry—listen 443—within a server’s configuration sets which port to accept secure traffic, letting the software adapt without recompiling.
Containment
After malware is detected on a workstation, administrators disconnect it from the network. This swift isolation prevents the infection from spreading deeper.
Controlled zone
A company’s servers sit behind a protective barrier, separating them from public networks. Entry points are restricted to reduce unwanted infiltration.
Cross-site scripting (XSS)
A malicious comment on a forum feeds unfiltered code to each visitor’s browser, secretly extracting login tokens for misuse.
Crowdsourcing
A nonprofit group solicits ideas from global volunteers on designing better cybersecurity training modules, tapping the wisdom of many.
Cryptographic attack
A determined adversary tries various keys or algorithm tricks to unlock encrypted data, probing for any sign of mathematical weakness.
Cryptographic key
A specialized string ensures that scrambled messages can only be unscrambled by someone holding the matching piece, preventing casual interception.
Cryptography
Messages in transit get encoded using transformations only authorized parties can reverse, deterring digital eavesdropping or forgery attempts.
Cryptojacking
An unnoticed script hijacks a workstation’s processing power to mine virtual currency, causing performance slowdowns while quietly benefiting the attackers.
CVE Numbering Authority (CNA)
Certain prominent software makers receive the authority to assign official IDs to new vulnerabilities discovered in their products, streamlining tracking and disclosure.
Cybersecurity (or security)
An organization coordinates defenses—firewalls, employee training, encryption, and monitoring—so data theft or sabotage attempts are less likely to succeed.
Data
Every online post, clicked link, or file download turns real-world actions into digital records, forming the essence of modern life’s information exchange.
Data at rest
An archive of old user profiles on a backup drive remains untouched. Since it’s not actively in use, it’s only accessed when a restore is needed or a policy demands review.
Database
A structured system organizes product inventories, customer orders, and shipping details into tables. Queries allow rapid lookups or updates at scale.
Data controller
A marketing team decides what personal details to collect for a campaign, setting how and why this information is used, shaping the broader data strategy.
Data custodian
A hosting provider physically stores and secures files on behalf of an enterprise. Though they don’t dictate business rules, they must ensure that stored information remains safeguarded.
Data exfiltration
A disgruntled staff member discreetly copies sensitive intellectual property onto a hidden USB drive, intending to leak it to a competitor.
Data in transit
An emailed contract passes through multiple network routers, vulnerable to interception if it isn’t properly protected along the path.
Data in use
While editing a spreadsheet, the active cells live in working memory, making them vulnerable if malicious software gains access at that moment.
Data owner
An attorney in a law firm decides who has permission to open particular case files, taking ultimate responsibility for the confidentiality of that content.
Data packet
A streamed video breaks into numerous small chunks. Each travels a complex route over the internet, reassembling seamlessly on the viewer’s device.
Data point
A phone’s location log at a single timestamp stands as a discrete measurement among many that map user movement and behavior trends.
Data processor
A marketing platform handles client-supplied email lists, sending promotions according to explicit client instructions without owning the data itself.
Data protection officer (DPO)
A hospital appoints a specialist to ensure all activities, from patient record handling to staff training, meet stringent data privacy regulations.
Data type
In a script, numerical fields like 42 are processed differently than a text field like ‘Address.’ Each format is handled by different logic rules.
Date and time data
A system logs an event as 2025-01-15 14:00:00, documenting both calendar day and exact moment for thorough auditing or scheduling.
Debugger
A developer halts a program mid-run to inspect values, stepping line-by-line to discover which logic flaw is causing a repeated crash.
Debugging
An interactive approach narrows down a bug by methodically eliminating issues, checking each variable until the faulty logic or calculation emerges.
Defense in depth
A combination of perimeter firewalls, host-level monitoring, intrusion detection, and regular patching forms multiple overlapping shields to deter would-be infiltrators.
Denial of service (DoS) attack
Maliciously overwhelming a target with far more data requests than it can handle leaves legitimate users locked out, halting normal operations.
Detect (NIST core function)
A finance company sets up real-time monitoring systems that spot irregular transactions quickly, minimizing harmful fraud attempts.
Detection
Network sensors alert an administrator the moment unusual outbound connections emerge, hinting at a possible early-stage intrusion.
Dictionary data
A key-value layout in code organizes user details, enabling quick lookups by specifying the field name for direct retrieval.
Digital certificate
While navigating to an encrypted site, the browser verifies a digital signature that vouches for the site’s legitimacy and encryption authority.
Digital forensics
After a network intrusion, specialists meticulously examine log files, memory captures, and disk images to piece together exactly how the incursion unfolded.
Directory
A workspace on a system collects relevant files together, letting users and administrators keep projects separate and well-structured.
Disaster recovery plan
A thorough document outlines how an organization will restore critical processes if a hurricane wipes out the main office, ensuring readiness for worst-case events.
Distributed denial of service (DDoS) attack
An entire army of compromised machines collectively bombards a website with requests, pushing bandwidth and servers to their limits.
Distributions
Enthusiasts select from variants that share a core platform but differ in available packages, default tools, or targeted use-cases.
Documentation
Explicitly written steps help staff respond consistently to suspicious emails, ensuring no critical action is missed under pressure.
DOM-based XSS attack
Malicious code is embedded into a webpage’s own script logic, activating when a user’s browser processes or interacts with certain elements locally.
Domain Name System (DNS)
Whenever a user types a website name, a lookup transforms that human-readable label into a numerical destination recognized by the internet.
Dropper
A small, unremarkable file sneaks into a system and then quietly fetches a heavier malicious program, expanding the scope of the infection.
Elevator pitch
In a brief moment with a potential sponsor, someone articulates their cybersecurity background and major accomplishments, aiming to spark further discussion.
Encapsulation
A hidden channel around the original data is formed, making outside observers see only protected information that they can’t decode.
Encryption
An online banking service automatically scrambles all transmitted details, minimizing risk even if criminals intercept the traffic.
Endpoint
Workstations, mobile devices, or servers all connect to the bigger network and require protective measures, as they can be exploited individually.
Endpoint detection and response (EDR)
A protective client continually monitors a computer for questionable behavior, quarantining suspicious files and sending alerts for deeper review.
Eradication
Once investigations confirm infiltration points, every trace of harmful code is uprooted, and vulnerable paths are reinforced against repeat attacks.
Escalation policy
If an on-call engineer fails to address a severe nighttime breach within an hour, the incident auto-assigns to a more senior team for emergency containment.
Event
A user logs in from a remote country at 3 A.M., prompting a flag in the security console that something might be amiss.
Exception
Code attempting to open a file that doesn’t exist halts abruptly unless there’s a fallback routine specifying what to do in this unexpected case.
Exclusive operator
A coding rule in a raffle app checks whether a user qualifies either for the discount or the freebie, but not both, ensuring no double rewards.
Exploit
Attackers see an unsecured admin panel and slip in with zero barriers, taking advantage of a setting left wide open.
Exposure
Sensitive credentials remain in a public repository, meaning anyone with a browser can locate and misuse the keys for unauthorized data access.
External threat
Phishing emails from unknown origins flow into staff inboxes, aiming to dupe people into revealing internal login details.
False negative
Malicious code hides in plain sight because the scanner mistakenly believes the file is safe, allowing the infection to spread undetected.
False positive
A security system flags a routine system update as malicious, resulting in blocked downloads and wasted time investigating a benign file.
Fileless malware
A hidden script leverages built-in command-line tools so nothing new is written to disk, making detection by traditional antivirus more difficult.
File path
On a Windows system, something like D:\Projects\2025\Tasks.xlsx points directly to the spreadsheet’s exact location on that drive.
Filesystem Hierarchy Standard (FHS)
A Linux user places host settings in /etc and log files in /var/log, following the typical organizational approach many distributions uphold.
Filtering
A team examining a large data table narrows down entries to a specific date range, rapidly isolating relevant information without manually scanning everything.
Final report
After investigating a ransomware outbreak, security leaders compile timelines, discovered root causes, and recommended improvements into one comprehensive document.
Firewall
A protective barrier silently inspects passing data, discarding anything that doesn’t comply with safe usage rules, thus restricting malicious intrusions.
Float data
Financial calculations, such as interest rates, rely on decimal precision to avoid rounding errors that could add up significantly over time.
Foreign key
One table in a database references a unique identifier from another table, ensuring proper relationships and preventing mismatched records.
Forward proxy server
A university sends all student web traffic through a single point, applying content filters or logging usage before forwarding the request to the internet.
Function
A chunk of reusable script might handle logging for an application, centralizing the process of writing consistent entries in a system log.
Global variable
A file declares a configuration parameter accessible everywhere else in the code, impacting many functions that rely on that same setting.
Graphical user interface (GUI)
A user navigates via buttons and icons on the screen, rarely typing commands and relying instead on visual elements to operate the machine.
Hacker
A curious individual or group attempts to bypass standard defenses for various reasons, ranging from beneficial auditing to malicious sabotage.
Hacktivist
A group targeting government websites defaces official pages in protest, merging technical break-ins with a socially or politically charged message.
Hard drive
A physical storage medium in a desktop or laptop holds personal data, programs, and the operating system for quick retrieval until it fails or is replaced.
Hardware
Physical building blocks like memory chips, CPUs, and circuit boards power digital functionalities; without them, software cannot run.
Hash collision
An improbability occurs when two different inputs produce the same digital fingerprint, questioning the reliability of that hashing approach.
Hash function
A user’s password is converted into a one-way scrambled form for secure storage, preventing the original string from being casually retrieved.
Hash table
A data structure uses a special formula to locate the right “bucket” quickly, allowing near-instant lookups even in large collections.
Health Insurance Portability and Accountability Act (HIPAA)
A clinic enforces strict access logs, encryption, and private record-keeping practices to avoid leaking patient details, aligning with mandated guidelines.
Honeypot
A decoy environment intentionally lures attackers, documenting every move so defenders can learn infiltration techniques without risking actual data.
Host-based intrusion detection system (HIDS)
A single workstation runs a monitoring agent that checks for suspicious file changes, unauthorized ports opening, or unrecognized background services.
Hub
In a simpler network setup, data frames sent in one port show up on all other ports, lacking the intelligence to route traffic only where needed.
Hypertext Transfer Protocol (HTTP)
When connecting to an unencrypted webpage, text flows in both directions, exposing content to anyone who intercepts the traffic.
Hypertext Transfer Protocol Secure (HTTPS)
Web activity is protected by encryption, allowing login forms, personal messages, and financial info to traverse the internet with confidentiality intact.
Identify (NIST core function)
A business systematically looks at digital assets, ranking those critical for operation and acknowledging associated hazards so they can be addressed.
Identity and access management (IAM)
A system centralizes user logins, multi-factor checks, and role-based permissions, unifying how individuals prove who they are and what they can do.
IEEE 802.11 (Wi-Fi)
Wireless signals let laptops and phones communicate without cables, adhering to a set of standards that define speed, range, and security.
Immutable
A text string in certain programming languages can’t be changed once created, forcing new copies whenever a character sequence is revised.
Implement (NIST RMF)
An organization sets the chosen defenses in motion—deploying encryption, setting up intrusion monitoring, and recording official steps taken for auditing.
Improper usage
A staff member uses company equipment to illegally download copyrighted media, violating the organization’s guidelines and introducing new liability concerns.
Incident
A genuine crisis or near miss occurs—a compromised database or an attempted system hack—disrupting normal confidentiality, integrity, or availability.
Incident escalation
When frontline responders realize the scope of an infiltration is beyond their skill set, they shift the matter to senior investigators capable of deeper remediation.
Incident handler’s journal
A crisis responder maintains detailed entries of commands run, files accessed, and system logs checked, ensuring a complete event history for post-mortem analysis.
Incident response
A retailer’s website experiences customer card data theft, prompting an emergency plan: isolate impacted servers, remove malicious scripts, and inform stakeholders.
Incident response plan
A formal guide lists roles, contact details, and step-by-step actions employees must follow as soon as a cybersecurity alarm sounds.
Inclusive operator
A piece of logic checks if an order meets or exceeds a quantity threshold to qualify for special pricing, capturing any boundary case that meets the requirement.
Indentation
In certain languages, blocks are recognized by how many spaces precede each line, making visual formatting part of the language grammar.
Index
Selecting the first element from a list relies on an integer offset, ensuring the program fetches precisely the desired item.
Indicators of attack (IoA)
Uninstalling security software followed by attempts to run questionable scripts reveals a possibly active intrusion in its early stages.