Cyber Flashcards
(431 cards)
Absolute file path
While diagnosing a server issue in a Linux environment, an engineer references /etc/apache2/apache2.conf to specify the entire location beginning at root. This ensures pinpoint accuracy, preventing mistakes that arise when relative paths lead to overlooked or duplicate directories.
Access controls
Within a financial institution, only certain employees handle loan applications. Privilege settings and password policies prevent unauthorized team members from accessing sensitive records, demonstrating how organizational structure can reinforce data protection.
Active packet sniffing
An attacker stealthily intercepts and modifies traffic between a buyer’s browser and the online store. Payment details are altered in-flight, illustrating how unprotected channels can be manipulated to redirect funds or steal information.
Address Resolution Protocol (ARP)
Before a workstation sends data over a network, it needs the physical identifier of the next router. A lookup matches the numeric network address to the hardware address, ensuring that packets flow to the intended destination without confusion.
Advanced persistent threat (APT)
A rogue actor quietly infiltrates a large corporation’s data center, siphoning off confidential research for months. The intruder stays hidden by blending into normal traffic patterns, prolonging the breach and maximizing the data theft.
Adversarial artificial intelligence (AI)
A machine-learning email filter is gradually fed deceptive training examples by malicious entities. Over time, the filter flags fewer scam emails, revealing how subtle interference can sabotage advanced automated defenses.
Adware
A free media player continuously launches pop-up banners and embedded offers whenever it’s opened. Users grow frustrated with the frequent interruptions, unaware that these on-screen promotions generate revenue for the software’s distributor.
Algorithm
A mapping service calculates the optimal driving route by weighing real-time congestion, planned road closures, and distance. This step-by-step logic systematically chooses the path that balances speed and convenience under given conditions.
Analysis
A security professional receives an off-hours notification about multiple account lockouts. Delving into logs, traffic captures, and error messages helps uncover whether an automated script or a determined threat actor is probing the system.
Angler phishing
A criminal masquerades as social media support for a well-known entertainment platform, assuring worried users they can fix billing issues if they provide credit card details. The personal touch convinces many victims that the messages are genuine.
Anomaly-based analysis
A financial service flags a credit card purchase for review when it doesn’t match the owner’s habitual spending pattern. Rather than relying on known attack signatures, the system spots outliers that might indicate fraudulent use.
Antivirus software
A computer utility constantly watches incoming files and background processes, erasing any discovered malicious code. This routine scanning keeps everyday operations safer by halting harmful executables before they spread.
Application
A user launches a dedicated program on their device to edit images for a marketing brochure. This tool focuses on a specific task—modifying graphics—offering features unavailable in more general-purpose software.
Application programming interface (API) token
A weather service grants a unique encrypted code to an app developer, letting the app retrieve the latest forecast data. Each request is verified with this code to confirm it’s coming from a trusted source.
Argument (Linux)
Someone inputs ls -l /var/www/html to see file details in the web directory. The program uses /var/www/html as the subject of the listing, interpreting it as the location being examined.
Argument (Python)
A custom function in a script might be called with add_score(10, 5). The function’s logic processes the numeric details passed in, adjusting a running total accordingly.
Array
A video game tracks the five best players in a structured list, ensuring quick access to scores and enabling easy updates whenever a new player surpasses a previous record.
Assess (NIST RMF)
An enterprise installs intrusion detection systems and verifies if they properly detect simulated attacks. Logs and test results show whether each control is effectively blocking potential threats before sign-off.
Asset
A personal smartphone containing messages, photos, and credentials demands protective measures at both the software and physical levels—highlighting how essential resources deserve thorough safeguarding.
Asset classification
An IT department labels newly developed source code as “Restricted” while routine memos remain “Public.” This labeling process guides security budgets and safety measures based on risk and confidentiality.
Asset inventory
A hospital catalogs all electronic patient record systems, diagnostic devices, and lab computers, maintaining an organized list. This helps identify which equipment needs critical updates or security patches first.
Asset management
A corporation monitors the current status of every server, laptop, and specialized tool, noting which ones pose vulnerabilities or need attention. Frequent reviews enable faster responses to evolving threats.
Asymmetric encryption
An individual sends sensitive data using an open, shareable locking mechanism, while the intended reader alone holds the secret key for unlocking. This separation of locks and keys ensures that only the correct recipient can decode messages.
Attack surface
A local shop sets up an online storefront, remote invoicing, and a cloud-based point-of-sale system. Each new feature potentially increases the ways intruders can break in, warranting thorough protective steps.