Cyber Flashcards

(431 cards)

1
Q

Absolute file path

A

While diagnosing a server issue in a Linux environment, an engineer references /etc/apache2/apache2.conf to specify the entire location beginning at root. This ensures pinpoint accuracy, preventing mistakes that arise when relative paths lead to overlooked or duplicate directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

Within a financial institution, only certain employees handle loan applications. Privilege settings and password policies prevent unauthorized team members from accessing sensitive records, demonstrating how organizational structure can reinforce data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active packet sniffing

A

An attacker stealthily intercepts and modifies traffic between a buyer’s browser and the online store. Payment details are altered in-flight, illustrating how unprotected channels can be manipulated to redirect funds or steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP)

A

Before a workstation sends data over a network, it needs the physical identifier of the next router. A lookup matches the numeric network address to the hardware address, ensuring that packets flow to the intended destination without confusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced persistent threat (APT)

A

A rogue actor quietly infiltrates a large corporation’s data center, siphoning off confidential research for months. The intruder stays hidden by blending into normal traffic patterns, prolonging the breach and maximizing the data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial artificial intelligence (AI)

A

A machine-learning email filter is gradually fed deceptive training examples by malicious entities. Over time, the filter flags fewer scam emails, revealing how subtle interference can sabotage advanced automated defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

A free media player continuously launches pop-up banners and embedded offers whenever it’s opened. Users grow frustrated with the frequent interruptions, unaware that these on-screen promotions generate revenue for the software’s distributor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A mapping service calculates the optimal driving route by weighing real-time congestion, planned road closures, and distance. This step-by-step logic systematically chooses the path that balances speed and convenience under given conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis

A

A security professional receives an off-hours notification about multiple account lockouts. Delving into logs, traffic captures, and error messages helps uncover whether an automated script or a determined threat actor is probing the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Angler phishing

A

A criminal masquerades as social media support for a well-known entertainment platform, assuring worried users they can fix billing issues if they provide credit card details. The personal touch convinces many victims that the messages are genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-based analysis

A

A financial service flags a credit card purchase for review when it doesn’t match the owner’s habitual spending pattern. Rather than relying on known attack signatures, the system spots outliers that might indicate fraudulent use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus software

A

A computer utility constantly watches incoming files and background processes, erasing any discovered malicious code. This routine scanning keeps everyday operations safer by halting harmful executables before they spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application

A

A user launches a dedicated program on their device to edit images for a marketing brochure. This tool focuses on a specific task—modifying graphics—offering features unavailable in more general-purpose software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API) token

A

A weather service grants a unique encrypted code to an app developer, letting the app retrieve the latest forecast data. Each request is verified with this code to confirm it’s coming from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Argument (Linux)

A

Someone inputs ls -l /var/www/html to see file details in the web directory. The program uses /var/www/html as the subject of the listing, interpreting it as the location being examined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Argument (Python)

A

A custom function in a script might be called with add_score(10, 5). The function’s logic processes the numeric details passed in, adjusting a running total accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Array

A

A video game tracks the five best players in a structured list, ensuring quick access to scores and enabling easy updates whenever a new player surpasses a previous record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assess (NIST RMF)

A

An enterprise installs intrusion detection systems and verifies if they properly detect simulated attacks. Logs and test results show whether each control is effectively blocking potential threats before sign-off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asset

A

A personal smartphone containing messages, photos, and credentials demands protective measures at both the software and physical levels—highlighting how essential resources deserve thorough safeguarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asset classification

A

An IT department labels newly developed source code as “Restricted” while routine memos remain “Public.” This labeling process guides security budgets and safety measures based on risk and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asset inventory

A

A hospital catalogs all electronic patient record systems, diagnostic devices, and lab computers, maintaining an organized list. This helps identify which equipment needs critical updates or security patches first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asset management

A

A corporation monitors the current status of every server, laptop, and specialized tool, noting which ones pose vulnerabilities or need attention. Frequent reviews enable faster responses to evolving threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric encryption

A

An individual sends sensitive data using an open, shareable locking mechanism, while the intended reader alone holds the secret key for unlocking. This separation of locks and keys ensures that only the correct recipient can decode messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attack surface

A

A local shop sets up an online storefront, remote invoicing, and a cloud-based point-of-sale system. Each new feature potentially increases the ways intruders can break in, warranting thorough protective steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Attack tree
A tech company visualizes every possible weakness leading to customer data exposure, starting from phishing employee credentials to physically infiltrating the data center. Each path reveals how attackers might progress.
26
Attack vectors
Cybercriminals might slip malicious files into a free download, craft believable email scams, or trick employees with public Wi-Fi. Each trick provides an entry point for covertly accessing protected environments.
27
Authentication
A secure portal requests a username, password, and face recognition. The combination fortifies identity verification, making unauthorized logins much harder.
28
Authorization
A logged-in team member only sees certain options in the internal dashboard, while higher-level roles unlock advanced menus. Access boundaries reflect the functional separation of responsibilities.
29
Authorize (NIST RMF)
Executive leaders review a comprehensive risk analysis for a new payment platform and formally approve it. This sign-off acknowledges both the benefits and the associated liabilities.
30
Automation
A script closes stale support requests automatically if users don’t respond, reducing repetitive tasks for human agents. Fewer manual chores free time for more complex problems.
31
Availability
An online bookstore invests in redundant database clusters, balancing requests across several servers. Even if one goes offline, buyers can continue placing orders without interruption.
32
Baiting
A USB stick labeled “Executive Salaries” is left in a break room, tempting a curious staff member to plug it in. Once opened, the device executes hidden malicious code on the host computer.
33
Bandwidth
Users in a crowded office notice slower connections whenever large data backups run. The pipeline capacity gets saturated, creating performance lags for everyone sharing the same link.
34
Baseline configuration (baseline image)
New servers are rolled out using a standard template that has pre-installed security updates and necessary software. This consistency ensures each system aligns with the company’s vetted setup.
35
Bash
In a Unix-like environment, a professional types commands to navigate directories, manage files, and run scripts. The input is parsed and executed, offering powerful text-based control over the system.
36
Basic auth
A website prompts for a username and password, transmitting them in a simpler, less secure format without advanced cryptographic layers. This approach is direct but often replaced with stronger safeguards.
37
Basic Input/Output System (BIOS)
An older machine runs a tiny program after powering on, instructing hardware to find where the main operating system resides. This initial routine is critical for a successful startup sequence.
38
Biometrics
A traveler at an airport gate confirms identity using a unique facial scan, streamlining the boarding process and cutting down on manual ID checks.
39
Bit
A single storage element in a digital device can only be on or off, signifying the most fundamental data building block in computing.
40
Boolean data
An access-control system has a switch that’s either on or off, marking whether a door is locked and reinforcing straightforward, yes/no logic.
41
Bootloader
When powering a smartphone, a minimal program starts running. It prepares the environment by checking components and then passes control to the main system software.
42
Botnet
A large number of infected personal devices worldwide respond to hidden commands, sending spam or launching massive traffic floods upon a single orchestrated instruction.
43
Bracket notation
In a Python list, selecting index [3] retrieves the fourth element. This indexing method organizes data retrieval in a predictable way.
44
Broken chain of custody
After seizing a suspect’s computer drive, an investigator forgets to log where it was kept overnight. Missing records create doubt about any evidence obtained.
45
Brute force attack
A hacker repeatedly tries every conceivable password variation, hoping that a successful guess eventually grants entry to an account.
46
Bug bounty
A company publicly invites ethical hackers to find flaws, rewarding them with cash or recognition. This method helps identify holes before malicious actors discover them.
47
Built-in function
A programming environment provides shortcuts—like quickly measuring a string’s length—enabling rapid coding without reinventing common operations.
48
Business continuity
A natural disaster knocks out power across the city, but alternate datacenters keep critical applications running. Customers experience minimal service disruption thanks to layered resilience.
49
Business continuity plan (BCP)
A well-documented approach details backup office spaces and fallback technology solutions, allowing a seamless shift if the primary site becomes unreachable.
50
Business Email Compromise (BEC)
An accountant receives an urgent request to transfer funds, seemingly from the CEO. The message includes just enough personal detail to appear genuine, pressuring quick action.
51
Categorize (NIST RMF)
An online retailer identifies which servers are vital for processing payments and which systems only contain marketing data. Sensitivity levels guide where to dedicate the most robust defenses.
52
CentOS
A firm installs a freely available enterprise-grade server environment that mirrors a commercial product’s reliability. They focus on open-source benefits and stable long-term support.
53
Central Processing Unit (CPU)
A user with multiple browser tabs, video editing, and data modeling open simultaneously relies on a core component that orchestrates and executes instructions at blazing speed.
54
Chain of custody
Investigators place sealed evidence in a labeled bag, logging the time and name of each person who handles it. This rigorous audit trail maintains the integrity of what’s collected.
55
Chronicle
A global corporation pipes all system logs into a powerful cloud-based console, letting security teams analyze suspicious patterns or correlate events across many regions in seconds.
56
Cipher
A chat app scrambles messages so that, without the decoding steps, the text appears meaningless. The method ensures eavesdroppers see only jumbled content.
57
Cloud-based firewalls
A small company relies on a hosted security layer that scans and filters traffic through a provider’s data center, offloading the need for on-premise appliances.
58
Cloud computing
Engineers move from in-house hardware to remote hosted servers, paying only for the resources actually used. This flexibility saves costs and simplifies upgrades.
59
Cloud network
Personal photos and documents stored on an internet-accessible service become reachable from any device, removing the dependence on physical storage mediums.
60
Cloud security
A financial startup configures restricted roles, applies encryption, and monitors logs in a large hosting environment, ensuring customers’ data stays confidential despite the shared platform.
61
Command
A user at the console types mkdir projectDocs, instructing the environment to make a new folder for organizing files.
62
Command and control (C2)
Compromised machines phone home to a hidden hub, awaiting fresh directives that could instruct them to launch attacks, steal data, or remain silent.
63
Command-line interface (CLI)
In a server room, text-based instructions allow precise file manipulation, system monitoring, and script automation without needing a graphical display.
64
Comment
Within a code file, short annotations clarify purpose or logic, but don’t impact how the computer ultimately executes operations.
65
Common Event Format (CEF)
A security platform receives logs with a consistent structure, including time, source, and event details, making it simpler to filter and analyze across diverse systems.
66
Common Vulnerabilities and Exposures (CVE®) list
A widely recognized index assigns numbers to newly found software weaknesses, letting teams track critical issues systematically.
67
Common Vulnerability Scoring System (CVSS)
A software flaw that enables remote takeover might earn a near-maximum severity rating, motivating teams to fix it before lower-rated items.
68
Compliance
A healthcare organization employs strict data handling protocols and encryption to align with applicable privacy mandates, ensuring legal and ethical standards are met.
69
Computer security incident response teams (CSIRT)
A specialized group steps in when malware strikes, investigating the extent, closing gaps, and helping the business resume normal operations.
70
Computer virus
A self-replicating file infiltrates various folders, attaching its destructive payload to unsuspecting programs until it’s detected or removed.
71
Conditional statement
A code block checks if an employee’s role is “manager,” then grants them access to advanced analytics. Otherwise, the system restricts them to basic views.
72
Confidentiality
A corporate portal ensures only authorized people can see internal sales figures. Encryption and strict credential checks keep outside eyes away.
73
Confidential data
Engineers store design prototypes in a locked lab and limit access to senior staff. Revealing such materials could undermine competitive advantage.
74
Confidentiality, integrity, availability (CIA) triad
A secure hospital system only shows patient records to doctors, guards info from tampering, and ensures records stay online for medical emergencies.
75
Configuration file
A text entry—listen 443—within a server’s configuration sets which port to accept secure traffic, letting the software adapt without recompiling.
76
Containment
After malware is detected on a workstation, administrators disconnect it from the network. This swift isolation prevents the infection from spreading deeper.
77
Controlled zone
A company’s servers sit behind a protective barrier, separating them from public networks. Entry points are restricted to reduce unwanted infiltration.
78
Cross-site scripting (XSS)
A malicious comment on a forum feeds unfiltered code to each visitor’s browser, secretly extracting login tokens for misuse.
79
Crowdsourcing
A nonprofit group solicits ideas from global volunteers on designing better cybersecurity training modules, tapping the wisdom of many.
80
Cryptographic attack
A determined adversary tries various keys or algorithm tricks to unlock encrypted data, probing for any sign of mathematical weakness.
81
Cryptographic key
A specialized string ensures that scrambled messages can only be unscrambled by someone holding the matching piece, preventing casual interception.
82
Cryptography
Messages in transit get encoded using transformations only authorized parties can reverse, deterring digital eavesdropping or forgery attempts.
83
Cryptojacking
An unnoticed script hijacks a workstation’s processing power to mine virtual currency, causing performance slowdowns while quietly benefiting the attackers.
84
CVE Numbering Authority (CNA)
Certain prominent software makers receive the authority to assign official IDs to new vulnerabilities discovered in their products, streamlining tracking and disclosure.
85
Cybersecurity (or security)
An organization coordinates defenses—firewalls, employee training, encryption, and monitoring—so data theft or sabotage attempts are less likely to succeed.
86
Data
Every online post, clicked link, or file download turns real-world actions into digital records, forming the essence of modern life’s information exchange.
87
Data at rest
An archive of old user profiles on a backup drive remains untouched. Since it’s not actively in use, it’s only accessed when a restore is needed or a policy demands review.
88
Database
A structured system organizes product inventories, customer orders, and shipping details into tables. Queries allow rapid lookups or updates at scale.
89
Data controller
A marketing team decides what personal details to collect for a campaign, setting how and why this information is used, shaping the broader data strategy.
90
Data custodian
A hosting provider physically stores and secures files on behalf of an enterprise. Though they don’t dictate business rules, they must ensure that stored information remains safeguarded.
91
Data exfiltration
A disgruntled staff member discreetly copies sensitive intellectual property onto a hidden USB drive, intending to leak it to a competitor.
92
Data in transit
An emailed contract passes through multiple network routers, vulnerable to interception if it isn’t properly protected along the path.
93
Data in use
While editing a spreadsheet, the active cells live in working memory, making them vulnerable if malicious software gains access at that moment.
94
Data owner
An attorney in a law firm decides who has permission to open particular case files, taking ultimate responsibility for the confidentiality of that content.
95
Data packet
A streamed video breaks into numerous small chunks. Each travels a complex route over the internet, reassembling seamlessly on the viewer’s device.
96
Data point
A phone’s location log at a single timestamp stands as a discrete measurement among many that map user movement and behavior trends.
97
Data processor
A marketing platform handles client-supplied email lists, sending promotions according to explicit client instructions without owning the data itself.
98
Data protection officer (DPO)
A hospital appoints a specialist to ensure all activities, from patient record handling to staff training, meet stringent data privacy regulations.
99
Data type
In a script, numerical fields like 42 are processed differently than a text field like 'Address.' Each format is handled by different logic rules.
100
Date and time data
A system logs an event as 2025-01-15 14:00:00, documenting both calendar day and exact moment for thorough auditing or scheduling.
101
Debugger
A developer halts a program mid-run to inspect values, stepping line-by-line to discover which logic flaw is causing a repeated crash.
102
Debugging
An interactive approach narrows down a bug by methodically eliminating issues, checking each variable until the faulty logic or calculation emerges.
103
Defense in depth
A combination of perimeter firewalls, host-level monitoring, intrusion detection, and regular patching forms multiple overlapping shields to deter would-be infiltrators.
104
Denial of service (DoS) attack
Maliciously overwhelming a target with far more data requests than it can handle leaves legitimate users locked out, halting normal operations.
105
Detect (NIST core function)
A finance company sets up real-time monitoring systems that spot irregular transactions quickly, minimizing harmful fraud attempts.
106
Detection
Network sensors alert an administrator the moment unusual outbound connections emerge, hinting at a possible early-stage intrusion.
107
Dictionary data
A key-value layout in code organizes user details, enabling quick lookups by specifying the field name for direct retrieval.
108
Digital certificate
While navigating to an encrypted site, the browser verifies a digital signature that vouches for the site’s legitimacy and encryption authority.
109
Digital forensics
After a network intrusion, specialists meticulously examine log files, memory captures, and disk images to piece together exactly how the incursion unfolded.
110
Directory
A workspace on a system collects relevant files together, letting users and administrators keep projects separate and well-structured.
111
Disaster recovery plan
A thorough document outlines how an organization will restore critical processes if a hurricane wipes out the main office, ensuring readiness for worst-case events.
112
Distributed denial of service (DDoS) attack
An entire army of compromised machines collectively bombards a website with requests, pushing bandwidth and servers to their limits.
113
Distributions
Enthusiasts select from variants that share a core platform but differ in available packages, default tools, or targeted use-cases.
114
Documentation
Explicitly written steps help staff respond consistently to suspicious emails, ensuring no critical action is missed under pressure.
115
DOM-based XSS attack
Malicious code is embedded into a webpage’s own script logic, activating when a user’s browser processes or interacts with certain elements locally.
116
Domain Name System (DNS)
Whenever a user types a website name, a lookup transforms that human-readable label into a numerical destination recognized by the internet.
117
Dropper
A small, unremarkable file sneaks into a system and then quietly fetches a heavier malicious program, expanding the scope of the infection.
118
Elevator pitch
In a brief moment with a potential sponsor, someone articulates their cybersecurity background and major accomplishments, aiming to spark further discussion.
119
Encapsulation
A hidden channel around the original data is formed, making outside observers see only protected information that they can’t decode.
120
Encryption
An online banking service automatically scrambles all transmitted details, minimizing risk even if criminals intercept the traffic.
121
Endpoint
Workstations, mobile devices, or servers all connect to the bigger network and require protective measures, as they can be exploited individually.
122
Endpoint detection and response (EDR)
A protective client continually monitors a computer for questionable behavior, quarantining suspicious files and sending alerts for deeper review.
123
Eradication
Once investigations confirm infiltration points, every trace of harmful code is uprooted, and vulnerable paths are reinforced against repeat attacks.
124
Escalation policy
If an on-call engineer fails to address a severe nighttime breach within an hour, the incident auto-assigns to a more senior team for emergency containment.
125
Event
A user logs in from a remote country at 3 A.M., prompting a flag in the security console that something might be amiss.
126
Exception
Code attempting to open a file that doesn’t exist halts abruptly unless there’s a fallback routine specifying what to do in this unexpected case.
127
Exclusive operator
A coding rule in a raffle app checks whether a user qualifies either for the discount or the freebie, but not both, ensuring no double rewards.
128
Exploit
Attackers see an unsecured admin panel and slip in with zero barriers, taking advantage of a setting left wide open.
129
Exposure
Sensitive credentials remain in a public repository, meaning anyone with a browser can locate and misuse the keys for unauthorized data access.
130
External threat
Phishing emails from unknown origins flow into staff inboxes, aiming to dupe people into revealing internal login details.
131
False negative
Malicious code hides in plain sight because the scanner mistakenly believes the file is safe, allowing the infection to spread undetected.
132
False positive
A security system flags a routine system update as malicious, resulting in blocked downloads and wasted time investigating a benign file.
133
Fileless malware
A hidden script leverages built-in command-line tools so nothing new is written to disk, making detection by traditional antivirus more difficult.
134
File path
On a Windows system, something like D:\\Projects\\2025\\Tasks.xlsx points directly to the spreadsheet’s exact location on that drive.
135
Filesystem Hierarchy Standard (FHS)
A Linux user places host settings in /etc and log files in /var/log, following the typical organizational approach many distributions uphold.
136
Filtering
A team examining a large data table narrows down entries to a specific date range, rapidly isolating relevant information without manually scanning everything.
137
Final report
After investigating a ransomware outbreak, security leaders compile timelines, discovered root causes, and recommended improvements into one comprehensive document.
138
Firewall
A protective barrier silently inspects passing data, discarding anything that doesn’t comply with safe usage rules, thus restricting malicious intrusions.
139
Float data
Financial calculations, such as interest rates, rely on decimal precision to avoid rounding errors that could add up significantly over time.
140
Foreign key
One table in a database references a unique identifier from another table, ensuring proper relationships and preventing mismatched records.
141
Forward proxy server
A university sends all student web traffic through a single point, applying content filters or logging usage before forwarding the request to the internet.
142
Function
A chunk of reusable script might handle logging for an application, centralizing the process of writing consistent entries in a system log.
143
Global variable
A file declares a configuration parameter accessible everywhere else in the code, impacting many functions that rely on that same setting.
144
Graphical user interface (GUI)
A user navigates via buttons and icons on the screen, rarely typing commands and relying instead on visual elements to operate the machine.
145
Hacker
A curious individual or group attempts to bypass standard defenses for various reasons, ranging from beneficial auditing to malicious sabotage.
146
Hacktivist
A group targeting government websites defaces official pages in protest, merging technical break-ins with a socially or politically charged message.
147
Hard drive
A physical storage medium in a desktop or laptop holds personal data, programs, and the operating system for quick retrieval until it fails or is replaced.
148
Hardware
Physical building blocks like memory chips, CPUs, and circuit boards power digital functionalities; without them, software cannot run.
149
Hash collision
An improbability occurs when two different inputs produce the same digital fingerprint, questioning the reliability of that hashing approach.
150
Hash function
A user’s password is converted into a one-way scrambled form for secure storage, preventing the original string from being casually retrieved.
151
Hash table
A data structure uses a special formula to locate the right “bucket” quickly, allowing near-instant lookups even in large collections.
152
Health Insurance Portability and Accountability Act (HIPAA)
A clinic enforces strict access logs, encryption, and private record-keeping practices to avoid leaking patient details, aligning with mandated guidelines.
153
Honeypot
A decoy environment intentionally lures attackers, documenting every move so defenders can learn infiltration techniques without risking actual data.
154
Host-based intrusion detection system (HIDS)
A single workstation runs a monitoring agent that checks for suspicious file changes, unauthorized ports opening, or unrecognized background services.
155
Hub
In a simpler network setup, data frames sent in one port show up on all other ports, lacking the intelligence to route traffic only where needed.
156
Hypertext Transfer Protocol (HTTP)
When connecting to an unencrypted webpage, text flows in both directions, exposing content to anyone who intercepts the traffic.
157
Hypertext Transfer Protocol Secure (HTTPS)
Web activity is protected by encryption, allowing login forms, personal messages, and financial info to traverse the internet with confidentiality intact.
158
Identify (NIST core function)
A business systematically looks at digital assets, ranking those critical for operation and acknowledging associated hazards so they can be addressed.
159
Identity and access management (IAM)
A system centralizes user logins, multi-factor checks, and role-based permissions, unifying how individuals prove who they are and what they can do.
160
IEEE 802.11 (Wi-Fi)
Wireless signals let laptops and phones communicate without cables, adhering to a set of standards that define speed, range, and security.
161
Immutable
A text string in certain programming languages can’t be changed once created, forcing new copies whenever a character sequence is revised.
162
Implement (NIST RMF)
An organization sets the chosen defenses in motion—deploying encryption, setting up intrusion monitoring, and recording official steps taken for auditing.
163
Improper usage
A staff member uses company equipment to illegally download copyrighted media, violating the organization’s guidelines and introducing new liability concerns.
164
Incident
A genuine crisis or near miss occurs—a compromised database or an attempted system hack—disrupting normal confidentiality, integrity, or availability.
165
Incident escalation
When frontline responders realize the scope of an infiltration is beyond their skill set, they shift the matter to senior investigators capable of deeper remediation.
166
Incident handler’s journal
A crisis responder maintains detailed entries of commands run, files accessed, and system logs checked, ensuring a complete event history for post-mortem analysis.
167
Incident response
A retailer’s website experiences customer card data theft, prompting an emergency plan: isolate impacted servers, remove malicious scripts, and inform stakeholders.
168
Incident response plan
A formal guide lists roles, contact details, and step-by-step actions employees must follow as soon as a cybersecurity alarm sounds.
169
Inclusive operator
A piece of logic checks if an order meets or exceeds a quantity threshold to qualify for special pricing, capturing any boundary case that meets the requirement.
170
Indentation
In certain languages, blocks are recognized by how many spaces precede each line, making visual formatting part of the language grammar.
171
Index
Selecting the first element from a list relies on an integer offset, ensuring the program fetches precisely the desired item.
172
Indicators of attack (IoA)
Uninstalling security software followed by attempts to run questionable scripts reveals a possibly active intrusion in its early stages.
173
Indicators of compromise (IoC)
Unfamiliar connections at odd hours, unexpected user account creation, or unknown processes running highlight that something malicious might have happened.
174
Information privacy
A user configures social media settings so only close friends can see personal updates, keeping random strangers out of those posts.
175
Information security (InfoSec)
Protective measures include network segmentation, rigorous training, and careful auditing, aiming to safeguard a company’s digital environment and data lifeblood.
176
Injection attack
Unsanitized user input leads to unintended commands executing in the backend database or system, often with results that compromise data integrity.
177
Input validation
An application ensures that only numerical values are entered for age, eliminating problematic strings or code that could corrupt the database.
178
Integer data
Inventory systems rely on whole numbers for items in stock, preventing confusion that might occur if decimals were mistakenly added to product counts.
179
Integrated development environment (IDE)
A programmer edits code in a specialized tool that flags errors, autocompletes functions, and debugs logic to speed up the software creation cycle.
180
Integrity
A file’s fingerprint changes if any part of it is altered, helping an organization verify whether stored data remains authentic and unmodified.
181
Internal hardware
A tower case encloses the CPU, RAM, and motherboard, physically powering the operating system and user applications.
182
Internal threat
A disenchanted employee with administrative privileges chooses to sabotage or steal critical resources, harming from the inside.
183
Internet Control Message Protocol (ICMP)
When “pinging” a remote system, tiny echo requests and replies measure whether the system is reachable and how long it takes to respond.
184
Internet Control Message Protocol flood (ICMP flood)
A wave of ping requests swamps a target machine, consuming its bandwidth or processing power and degrading performance for legitimate users.
185
Internet Protocol (IP)
Each chunk of data traveling online uses a structured addressing system to navigate from sender to receiver, akin to mailing addresses.
186
Internet Protocol (IP) address
A unique identifier, like 10.0.0.25, points traffic to the right device on a local or wide network, guiding packets to the correct location.
187
Interpreter
A language environment reads each script instruction, translating it on the fly into actions that the computer performs immediately.
188
Intrusion detection system (IDS)
A monitoring apparatus scrutinizes traffic, raising alarms if it observes any pattern matching known malicious footprints or unexpected anomalies.
189
Intrusion prevention system (IPS)
Beyond just alerting, this protective layer blocks questionable data flows or halts processes deemed threatening.
190
IP spoofing
Data packets appear to come from a trusted machine, tricking basic filters into believing the traffic is from a legitimate source.
191
Iterative statement
A looping construct repeatedly executes a block of code, stepping through data or continuing until a specified stop condition is met.
192
KALI LINUX™
A specialized environment loaded with scanning, exploitation, and forensic tools helps ethical testers identify and exploit security gaps to fix them.
193
Kernel
A central coordinator in a system manages CPU time, memory allocation, and device interactions, ensuring user programs can run effectively.
194
Key-value pair
Configuration settings might store serverHost=prodServer. The label points to the item, letting the application interpret that value whenever needed.
195
Legacy operating system
A factory sticks with an older version of software because it relies on custom programs that break on modern platforms, risking exposure to unpatched flaws.
196
Lessons learned meeting
After a social engineering success, the team convenes to analyze how they fell for the trick and to devise stronger policies or training to prevent repetition.
197
Library
A pre-compiled bundle of code handles common tasks, letting developers reuse proven routines for file handling, network requests, or math computations.
198
Linux
A widely adopted kernel powers countless variants, prized for its open nature and flexibility in server, desktop, and embedded environments.
199
List concatenation
A script merges two collections—like [1, 2] and [3, 4]—into a new sequence, forming [1, 2, 3, 4] for unified data handling.
200
List data
A user arranges a to-do list in code: [“Buy groceries”, “Email manager”, “Schedule checkup”], maintaining order for each upcoming task.
201
Loader
A tiny agent infiltrates a machine. It waits for commands to pull the real malicious payload from a remote location when triggered.
202
Local Area Network (LAN)
All computers, printers, and other devices in a small office are tied together, facilitating resource sharing and internal collaboration.
203
Local variable
Inside a function, a short-lived name references a piece of data, disappearing after that function ends and freeing up resources.
204
Log
Each time a user logs in or a critical system operation completes, a timestamped record is created, providing evidence for future analysis or audits.
205
Log analysis
Security staff pour through thousands of recorded events, identifying hidden anomalies or patterns that might indicate malicious or unstable behavior.
206
Logging
A service documents every transaction, state change, and error along the way, building a historical record for debugging and compliance.
207
Logic error
A script calculates total sales incorrectly if an internal formula points to the wrong variable, producing no compiler alert but clearly flawed outcomes.
208
Log management
A centralized platform gathers data from servers, firewalls, and applications into one place, ensuring important alerts and context aren’t missed.
209
Loop condition
A repetition continues as long as a certain test remains true, controlling how many times a sequence of instructions executes.
210
Loop variable
Counting from 0 to 9 in a loop requires a single placeholder that increments by 1 each cycle until hitting 10.
211
Malware
Malicious software disrupts or quietly abuses systems for theft, destruction, or espionage, often hidden behind seemingly harmless files or links.
212
Malware infection
Clicking a suspicious link results in destructive code spreading throughout the corporate network if not promptly contained.
213
Media Access Control (MAC) address
Network adapters each hold a hardware identifier, typically unique worldwide, used for delivering messages at the link layer.
214
Method
In a programming language, some objects come with built-in routines; for instance, a text string can be converted to uppercase with a quick call.
215
Metrics
Website uptime, page loading speed, and error rates help measure the stability of digital services, guiding improvements and capacity planning.
216
MITRE
Security pros reference a well-curated taxonomy that documents adversary methods, enabling consistent threat analysis and communication worldwide.
217
Modem
A box at home translates signals from an internet provider into digital data that routers and computers understand, bridging external and local networks.
218
Module
A set of Python code components might handle networking tasks; importing it provides direct access to pre-written, tested functionality.
219
Monitor (NIST RMF)
After implementing defensive measures, a continuous watch ensures these safeguards remain effective and adjusts if new threats emerge.
220
Multi-factor authentication (MFA)
A second verification—like a smartphone approval—thwarts attackers who might steal passwords but lack additional keys.
221
nano
A simple text editor on Unix-like systems helps administrators modify configuration files quickly without advanced or complex features.
222
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
An overarching structure helps businesses identify, protect, detect, respond, and recover, guiding strategic decisions around security practices.
223
National Institute of Standards and Technology (NIST) Incident Response Lifecycle
After attackers strike, teams work through phases: readiness, detection, confinement, resolution, and a retrospective to strengthen future defenses.
224
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53
Government-affiliated guidance outlines baseline controls—from encryption policies to physical safeguards—to ensure standardized risk management.
225
Network
Multiple machines communicate with each other or the internet, sharing files and resources, enabled by protocols and physical connections.
226
Network-based intrusion detection system (NIDS)
A device on the subnet sees all passing data, checking patterns for signatures or anomalies that imply malicious attempts.
227
Network data
A streaming service pushes video frames over the internet, sending a continuous flow of small units from its servers to each viewer.
228
Network Interface Card (NIC)
The embedded or plug-in component letting a computer speak to others via Ethernet or Wi-Fi, effectively bridging software with physical signals.
229
Network log analysis
Reviewing router or firewall records can reveal suspicious spikes in outbound traffic, unrecognized IPs, or repeated connection failures.
230
Network protocol analyzer (packet sniffer)
A diagnostic tool captures raw data transmissions, helping engineers troubleshoot or security analysts confirm suspicious communications.
231
Network protocols
A set of rules, such as TCP or UDP, define how information is packaged, addressed, transmitted, and received in a standardized manner.
232
Network security
A retail chain enforces a specialized firewall, robust wireless encryption, and a segmented architecture, ensuring minimal unauthorized internal movement if one piece is compromised.
233
Network segmentation
A manufacturing line keeps industrial control systems on a specialized internal subnet, protecting it from the corporate employee network and outside threats.
234
Network traffic
Browsing, emails, file syncs, and video calls collectively form data flowing across connected devices, carrying content between points.
235
Non-repudiation
A digitally signed message binds the identity of the sender, making it difficult to deny they originated the communication or transaction.
236
Notebook
A scientist runs code, shows charts, and writes commentary in one interactive environment, making research steps transparent and reproducible.
237
Numeric data
Whether it’s user age or the number of product items sold, storing numeric values ensures arithmetic or comparisons remain feasible.
238
OAuth
A user logs into a third-party site via a large identity provider, granting only the specific info needed, never sharing the main password.
239
Object
A structure in certain languages organizes data fields and related behaviors, offering a blueprint for advanced data manipulation.
240
On-path attack
A hidden intermediary intercepts messages from both sides, reading or altering them before passing them along, unnoticed by sender or receiver.
241
Open-source intelligence (OSINT)
Public digital footprints, like social media updates or posted code, can be aggregated to build a surprisingly detailed profile of a target.
242
Open systems interconnection (OSI) model
A conceptual approach breaks network communication into layered steps, clarifying how data travels from hardware signals to application messages.
243
Open Web Application Security Project (OWASP)
Developers consult influential guidance outlining the gravest pitfalls for web apps, ensuring they address common coding oversights.
244
Operating system (OS)
A foundational layer coordinates hardware resources, memory, and application interfaces, enabling a smooth environment to run software.
245
Operator
In a programming context, certain symbols manipulate variables—like + for arithmetic or == for comparison—shaping how data is handled.
246
Options
Typing ls -a might display hidden files in addition to visible ones, altering the command’s behavior with extra flags.
247
Order of volatility
In a forensics situation, data in live memory is collected first because it disappears upon shutdown, while logs on disks remain longer.
248
OWASP Top 10
Engineers build web platforms with knowledge of frequently exploited coding mistakes—like cross-site scripting or SQL injection—aiming to dodge them.
249
Package
A collection of modules in Python might come pre-organized for advanced math or data processing, installable in one step for broad functionality.
250
Package manager
A maintenance tool tracks software dependencies, so installing one app automatically retrieves everything else it needs to function.
251
Packet capture (P-cap)
An administrator records network transmissions to a file, enabling post-incident replay and detailed scrutiny of suspicious data flows.
252
Packet sniffing
An observer at a public hotspot reads unencrypted traffic, gleaning emails or logins from unsuspecting users who connect without secure channels.
253
Parameter (Python)
A function blueprint includes placeholders where real values plug in during execution, letting the same routine work for multiple inputs.
254
Parrot
A specialized Linux variant includes built-in pentesting scripts and privacy utilities, favored by security researchers seeking a different environment from other well-known toolkits.
255
Parsing
Software breaks raw lines of data into labeled fragments, making logs or user inputs structured and easier to analyze or transform.
256
Passive packet sniffing
Someone taps into older hub-based networks, silently monitoring transmissions without injecting or altering any data, often going unnoticed.
257
Password attack
Using stolen credentials or systematically guessing until a login works, a malicious party attempts to gain unauthorized account access.
258
Patch update
Developers release a crucial fix after identifying a software bug that allows malicious code execution, urging immediate upgrades to block exploitation.
259
Payment Card Industry Data Security Standards (PCI DSS)
An e-commerce site applies mandatory encryption for card details and strictly limits which employees may see sensitive transaction data to avoid regulatory penalties.
260
Penetration test (pen test)
Ethical hackers thoroughly challenge an organization’s defenses, from external scanning to social engineering, sharing insights on vulnerabilities discovered.
261
PEP 8 style guide
Python code readability improves when common formatting, naming, and spacing conventions are followed, enabling consistency among multiple developers.
262
Peripheral devices
External attachments like printers or external hard drives expand a computer’s capabilities but must also be guarded against malicious tampering.
263
Permissions
A user can only read a file on a shared drive, while another can both read and write, reflecting different privilege levels set by the system.
264
Personally identifiable information (PII)
Details such as a full name, home address, or ID number can reveal someone’s identity, requiring careful protection to prevent misuse.
265
Phishing
An employee receives a well-crafted email from what looks like an internal manager, urging them to follow a link and fill in a password.
266
Phishing kit
A pre-packaged set of fake site templates and scripts is sold in hidden forums, letting amateurs launch impersonation campaigns easily.
267
Physical attack
Somebody physically intrudes into an office’s server room, overriding electronic locks or tampering with cables to access data without leaving a digital trace.
268
Physical social engineering
A newcomer tailgates behind someone else’s keycard-swipe entry, bypassing security by exploiting politeness or inattentiveness from the legitimate employee.
269
Ping of death
An unusually large network echo request is dispatched, surpassing buffer limits on older systems, potentially crashing them outright.
270
Playbook
A set of guidelines spells out the exact steps responders follow upon detecting ransomware, from isolating machines to contacting legal counsel.
271
Policy
An organization insists that every device be updated monthly and no personal USB drives are allowed, forming part of official guidelines for daily work.
272
Port
A listening post on a machine awaits certain kinds of traffic, distinguishing web server requests from remote login connections or email transmissions.
273
Port filtering
A security layer blocks all traffic except for a few authorized channels, letting specific services like SSH or HTTPS pass while discarding the rest.
274
Post-incident activity
After a malicious infiltration is resolved, the team revisits logs to learn from mistakes, refining processes for more robust prevention next time.
275
Potentially unwanted application (PUA)
A seemingly legitimate tool also installs browser add-ons or displays persistent ads, frustrating users by diminishing device performance or collecting usage data.
276
Private data
Personal diaries or non-public records deserve carefully restricted access, ensuring that unauthorized parties can’t read or share them.
277
Prepare (NIST RMF)
An organization invests in staff training, architecture reviews, and tabletop drills, building readiness for future incidents and shaping early response strategies.
278
Prepared statement
Developers craft database queries with placeholders, separating the command logic from any user input, thereby reducing injection risks.
279
Primary key
A system ensures each record in a user table has an exclusive identifier, preventing duplicates and enabling direct referencing for lookups.
280
Principle of least privilege
An assistant in finance sees only partial financial data needed for daily tasks, preventing access to entire budgets or confidential HR info.
281
Privacy protection
A messaging platform conceals phone numbers and applies end-to-end scrambling so only the communicating parties can decipher the messages.
282
Procedures
A medical practice outlines a step-by-step method for eliminating expired patient records, ensuring compliance and consistency in document destruction.
283
Process of Attack Simulation and Threat Analysis (PASTA)
Security teams systematically model potential threats, evaluating each route an attacker might take, then building proportional defenses aligned with actual risk.
284
Programming
A coder writes an automated script to compress logs every night, saving storage and making it simpler to retrieve historical data.
285
Protect (NIST core function)
A business enforces strong authentication, firewall rules, and data encryption, forming the crucial layer to deter or slow intruders.
286
Protected health information (PHI)
Medical test results, billing details, and prescriptions require extra safeguards, since leaking them can cause severe personal and legal repercussions.
287
Protecting and preserving evidence
A forensic copy of a compromised drive is made, ensuring no changes occur to the original. This method validates the authenticity of findings for legal processes.
288
Proxy server
All employee web traffic flows through an intermediate device that filters disallowed sites and logs activities, adding a corporate safeguard and usage oversight.
289
Public data
A government agency posts open datasets of city traffic statistics, making them freely accessible for research and transparency.
290
Public key infrastructure (PKI)
A chain of trust relies on recognized authorities that sign certificates, so web browsers automatically trust certain site credentials for encrypted sessions.
291
Python Standard Library
Basic modules for tasks like file manipulation, system interaction, or date formatting ship with the environment, removing the need for many external packages.
292
Query
A database request fetches all records of high-value customers who made purchases in a specific month, allowing refined analytics or marketing strategies.
293
Quid pro quo
A scam phone call promises special IT support or freebies in exchange for user credentials, relying on the victim’s desire for quick help.
294
Rainbow table
Precomputed cryptographic outputs for commonly used passwords speed up the unscrambling of poorly secured user logins.
295
Random Access Memory (RAM)
When multiple applications run, they keep active data here for fast retrieval. Power loss wipes the contents, making it ephemeral but vital for performance.
296
Ransomware
Malicious code silently encrypts crucial files, presenting a demand for money to unlock them; without backups, organizations face heavy disruption or data loss.
297
Rapport
During a brief conversation, the interviewee connects over a shared interest with the interviewer, easing tension and fostering a more open dialogue.
298
Recover (NIST core function)
A team reestablishes data and systems after a destructive breach, leaning on backups and carefully tested restoration steps to resume normal activities.
299
Recovery
A hospital faced with a widespread encryption fiasco reverts to offline repositories and validated backups, bringing patient care systems back online in phases.
300
Red Hat® Enterprise Linux®
An enterprise invests in a commercially supported variant with official updates, ensuring confidence in patches and timely vendor help for mission-critical tasks.
301
Reflected XSS attack
A malicious parameter in a URL bounces back from the server into the user’s browser, triggering harmful scripts that steal sensitive details.
302
Regular expression (regex)
A data-cleaning script uses a pattern to locate email addresses in unstructured text, standardizing them for consistent storage in a structured format.
303
Regulations
A financial services firm abides by industry mandates, encrypting all card transactions and auditing staff access, or else faces penalties.
304
Relational database
A reservation system links customer details, seat assignments, and payment records, ensuring consistent data across interconnected tables.
305
Relative file path
A developer references ../images/header.png from a webpage in a subfolder, adjusting the location dynamically based on the page’s current directory.
306
Replay attack
A previously valid login token gets captured and reused, fooling the system into thinking the user is logging in anew without fresh credentials.
307
Resiliency
A multinational enterprise mirrors data in multiple geographic regions, so a local natural disaster can’t completely halt its services or cause total data loss.
308
Respond (NIST core function)
An alert triggers immediate isolation of an infected machine, forensics to gauge damage, and patches or rule updates to counter the discovered threat.
309
Return statement
A block of code processes input and finally hands back a computed outcome to the part of the program that requested it.
310
Reverse proxy server
External site visitors connect first to an intermediate host. Requests are scrutinized or transformed before being forwarded to the actual web service inside the network.
311
Risk
Leaving an admin console accessible to all internet users could lead to server control being seized. The probability of a breach multiplies if no restrictions are in place.
312
Risk mitigation
A bank invests in second-factor authentication and frequent patching, reducing both the likelihood and impact of credential attacks or software flaws.
313
Root directory
On certain systems, everything branches downward from a single top-level folder, forming the foundational structure of stored files and subfolders.
314
Rootkit
Deep-level malicious modifications conceal themselves within the operating environment, letting intruders remotely control a system while hiding evidence from most detection.
315
Root user (or superuser)
A powerful account holds complete authority to install packages, edit system files, or remove restrictions, requiring extra caution in daily use.
316
Router
An intermediary piece of hardware inspects incoming messages, directing them to the correct device in a home or office network.
317
Salting
Password hashing gains complexity through added random strings. Two users with the same passphrase end up with distinct stored values, preventing direct comparison.
318
Scareware
Pop-ups shout that a user’s system is dangerously infected, pressuring them to buy a dubious cleanup tool that’s actually harmful or useless.
319
Search Processing Language (SPL)
A specialized syntax surfaces from large log collections, letting operators quickly filter results—for example, focusing on 404 errors at certain timestamps.
320
Secure File Transfer Protocol (SFTP)
Files transferred across networks are shielded by an encrypted tunnel, minimizing the chance that personal or proprietary data will be intercepted.
321
Secure shell (SSH)
An admin safely logs into a remote server via an encrypted line, preventing potential eavesdroppers from grabbing sensitive credentials.
322
Security architecture
A blueprint of layered defenses, segmented networks, and role-based policies shapes the organization’s protective design before systems are deployed.
323
Security audit
External specialists review an organization’s setup, comparing current practices against best practices or mandated guidelines and identifying shortfalls.
324
Security controls
Safeguards like encryption, multi-factor authentication, and content filtering collectively reduce the chances of successful system abuse.
325
Security ethics
A junior specialist stumbles on unencrypted social security numbers in a log. Reporting the oversight responsibly aligns with moral and professional standards.
326
Security frameworks
An organization systematically adopts recognized methods, ensuring comprehensive threat coverage rather than piecemeal patchwork solutions.
327
Security governance
Executives shape the formal direction and oversight of protective measures, distributing responsibilities and verifying compliance across the enterprise.
328
Security hardening
An administrator closes unused ports, removes default credentials, and applies the latest patches, reducing the number of possible openings for attackers.
329
Security information and event management (SIEM)
A monitoring system collects logs from diverse sources, running correlation rules to detect potential intrusions in real time and alert staff.
330
Security mindset
Developers ask, “How could someone misuse this?” as they design features, addressing vulnerabilities before attackers discover them.
331
Security operations center (SOC)
Around-the-clock observers coordinate threat detection, analyzing anomalies, and initiating the response to incidents across the business.
332
Security orchestration, automation, and response (SOAR)
A platform aggregates alerts, enriches them with intelligence, and triggers automatic isolation of suspicious endpoints, letting teams focus on deeper analysis.
333
Security posture
A company invests in robust tools, continuous employee security drills, and thorough patching cycles, reflecting an advanced stance against emerging cyber threats.
334
Security zone
Critical servers sit in a restricted network area, requiring robust authentication and minimal open ports, while public services reside in a less-trusted perimeter.
335
Select (NIST RMF)
Risk evaluations lead a company to choose which protection measures—like mandatory encryption or advanced scanning—are most suitable to address documented hazards.
336
Sensitive data
An app that stores government-issued IDs and personal addresses ensures encryption, restricting in-house staff’s access to only those who need it.
337
Sensitive personally identifiable information (SPII)
Documents holding name, date of birth, plus driver’s license data form a risky combination that could lead to identity theft if leaked.
338
Separation of duties
One clerk processes purchase orders while another signs off on final approval, limiting the power any single person wields over financial transactions.
339
Session
While shopping online, the site remembers user-selected items across multiple page visits, storing a temporary context to tie everything together until checkout.
340
Session cookie
A small identifier in the browser notifies the website which basket or user account is associated with each new request, disappearing after logout.
341
Session hijacking
An adversary grabs a valid session token from an unprotected network, slipping into a user’s session without needing credentials again.
342
Session ID
A random string is assigned when someone logs in, letting the server keep track of interactions tied to that user’s login phase.
343
Set data
A programming variable collects distinct categories (like {\"apples\", \"bananas\", \"cherries\"}), ignoring repeated insertions to remain a unique set.
344
Shared responsibility
A customer uses a major cloud service, with the provider securing data centers and hardware, while the customer must configure applications and manage user privileges.
345
Shell
A text-based environment interprets typed commands for copying files, stopping processes, or changing system-wide settings on Unix-like or other platforms.
346
Signature
An antivirus engine checks incoming files for known malicious byte patterns. If they match, the file is quarantined or deleted.
347
Signature analysis
A detection device compares traffic to a database of recognized malicious footprints, triggering immediate warnings if it spots a match.
348
Simple Network Management Protocol (SNMP)
Networking gear reports metrics—like CPU load or interface stats—to an overseeing console, aiding in performance monitoring and fault detection.
349
Single sign-on (SSO)
A user enters login details once and seamlessly moves among various corporate apps without re-entering passwords each time.
350
Smishing
A text on someone’s phone claims a big refund is waiting if they click a link. In reality, that link leads to a phishing site or malware-laden page.
351
Smurf attack
Spoofed ping requests broadcast across a network cause a flurry of replies flooding back to the forged source, overwhelming it.
352
Social engineering
Someone pretends to be tech support, coaxing a staff member into giving credentials. Exploiting trust bypasses even strong technical defenses.
353
Social media phishing
Openly accessible posts about a user’s pet or recent vacation help fraudsters craft personalized lures that seem more convincing.
354
Spear phishing
An email addresses its target by name, references their specific job role, and includes relevant office details, boosting credibility for the con.
355
Speed
A consumer’s broadband plan allows an upper limit of megabits per second, shaping how quickly they can download or stream content.
356
Splunk Cloud
A large entity sends event logs to a remotely managed analytics platform, relieving on-premises hardware constraints while gaining real-time threat visibility.
357
Splunk Enterprise
Servers on the corporate network ingest logs into a local analysis system, letting administrators correlate data and trigger action from inside the firewall.
358
Spyware
An unnoticed tool monitors keystrokes or web browsing habits, forwarding personal details to a hidden third party for data gathering or profit.
359
SQL (Structured Query Language)
A standard approach to creating, reading, updating, or deleting structured records in a table-based storage system, widely used in back-end services.
360
SQL injection
An input form without proper checks allows threat actors to slip in additional commands, reading or modifying data beyond normal authorization.
361
Stakeholder
C-level executives, managers, and department leads each have vested interests in how a security initiative proceeds, influencing funding or acceptance.
362
Standard error
A script’s mistakes and critical alerts flow to a separate output stream, ensuring they’re distinguished from normal results in logs or screens.
363
Standard input
A user’s typed data or piped text enters a running process in real time, guiding or modifying how the program behaves.
364
Standard output
Messages the program prints by default often appear on the screen, or are redirected to log files for future reference.
365
Standards
An organization aligns its system configurations with recognized benchmarks, ensuring best-practice settings for everything from account lockouts to patch schedules.
366
STAR method
In an interview, real-world examples are detailed step by step, discussing the situation, task, actions taken, and the final outcome to illustrate problem-solving in practice.
367
Stateful
Traffic filtering logic that tracks ongoing communication sessions, allowing returning packets that match an established conversation while blocking the rest.
368
Stateless
Every packet is filtered purely on rules without regard to prior context; each arrival is judged on its own, simplifying but reducing adaptability.
369
Stored XSS attack
Unfiltered user input writes malicious scripts into a website’s database, which unsuspecting visitors execute when they load the compromised pages.
370
String concatenation
Uniting \"Hello \" and \"World\" yields \"Hello World\", merging separate textual segments into a single phrase.
371
String data
A variable carrying a password, city name, or comment text uses a sequence of characters, manipulated differently than numbers or booleans.
372
Style guide
Company publications remain uniform by applying the same fonts, colors, and structural layouts, forming a consistent brand image across documents.
373
Subnetting
A large corporate network breaks addresses into sub-ranges, fostering better organization, improved security boundaries, and efficient traffic handling.
374
Substring
"From \"Cybersecurity
375
Sudo
A command typed with elevated rights on a Unix-based system grants temporary privileges to manage software or settings that are normally restricted.
376
Supply-chain attack
Hackers tamper with a widely used software dependency, so thousands of unsuspecting enterprises install the compromised code in their own environments.
377
Suricata
A network-level security tool compares live traffic with known malicious or suspicious signatures, optionally blocking the traffic or generating alerts.
378
Switch
Data arrives on one port and is forwarded only to the correct destination port, lowering collisions and improving efficiency over old-school broadcasting methods.
379
Symmetric encryption
Two parties share a single secret passphrase for both locking and unlocking messages, requiring trust that each keeps the key safe.
380
Synchronize (SYN) flood attack
Machines flood a server with handshakes, never completing them, tying up resources and causing legitimate requests to languish or fail.
381
Syntax
Coding instructions must adhere to grammar-like rules; missing a brace or semicolon often prevents the compiler or interpreter from proceeding.
382
Syntax error
A script that forgets to close a bracket fails immediately, highlighting a structural mistake in the code’s layout.
383
Tailgating
An outsider slips in behind an authorized staff member at a secured doorway, bypassing the requirement to scan or show personal credentials.
384
TCP/IP model
A four-layer framework simplifies how data travels from physical signals to application-level transmissions, enabling universal compatibility across networks.
385
tcpdump
An admin uses text-based capture to watch packets on an interface in real time, diagnosing slow connections or suspicious activity.
386
Technical skills
Configuration of specialized security tools, programming response scripts, or analyzing logs are notable proficiencies vital in many IT and security roles.
387
Telemetry
Endpoints forward usage patterns or threat alerts to a central system, helping IT staff see real-time status across the entire environment.
388
Threat
A malicious group that actively scans for outdated software to exploit highlights the looming potential danger to unpatched hosts.
389
Threat actor
A well-funded entity systematically develops advanced intrusion techniques, targeting governments or corporations with stealthy infiltration attempts.
390
Threat hunting
Security experts proactively comb through logs, memory, and networks, unearthing malicious patterns that automated systems haven’t flagged yet.
391
Threat intelligence
An organization receives updates on new phishing tactics or zero-day exploits from external feeds, adjusting defenses before direct attacks hit.
392
Threat modeling
Developers brainstorm possible attacker motives, methods, and data targets, then incorporate design choices to reduce the worst risks upfront.
393
Transferable skills
A nurse entering security can repurpose meticulous record-keeping, attention to detail, and high-stakes responsibility to excel in incident response and compliance.
394
Transmission Control Protocol (TCP)
A stable connection ensures data arrives in the proper sequence, re-sending any lost segments to maintain accurate transfers.
395
Triage
A flood of security alerts are sorted by priority, investigating the highest-risk incidents first to mitigate damage efficiently.
396
Trojan horse
A disguised application claims to do a useful task but also installs a hidden backdoor, allowing remote infiltration behind the scenes.
397
True negative
A scanning tool checks a system believed to be secure and finds nothing malicious. Subsequent inspections confirm the assessment was correct.
398
True positive
An alert that certain inbound traffic is malicious proves accurate after investigation, preventing a potentially damaging infiltration.
399
Tuple data
A small, fixed group of items is stored in a structure where elements can’t be replaced or reordered once established.
400
Type error
An attempt to blend text with numerical expressions halts execution because the program expects consistent data formats for those operations.
401
Ubuntu
A well-known system variant offers a user-friendly interface, community support, and stable updates suitable for desktops or servers.
402
Unauthorized access
Someone logs into an area they lack rights for by using borrowed credentials, bypassing intended protections and potentially viewing or modifying data improperly.
403
Uncontrolled zone
Everything beyond the internal firewalls is considered unpredictable or potentially hostile, requiring extra caution when exchanging data.
404
Unified Extensible Firmware Interface (UEFI)
On newer machines, a more flexible approach than older boot routines decides hardware initialization, security checks, and the next steps in loading the OS.
405
USB baiting
A flash drive labeled “Confidential Plans” left on a desk entices the curious, who inadvertently load the malicious code upon insertion into their workstation.
406
User
Anyone interacting with a computer system, whether a front-desk clerk or an administrator, must be accounted for in security planning.
407
User Datagram Protocol (UDP)
A quicker but less reliable method sends data without verifying every part arrived, often used in streaming or gaming scenarios.
408
User-defined function
A piece of code an author writes for a specific purpose—like formatting reports—can be called multiple times from different parts of a program.
409
User interface
A mobile app features clear icons and swipe gestures so individuals can accomplish tasks smoothly without learning complicated commands.
410
User provisioning
When new staff join a company, automated steps set up accounts and privileges so they can start work immediately without manual overhead.
411
Variable
A memory placeholder holds a changing piece of information, such as a running score, a user’s input, or a dynamic configuration value.
412
Virtual Private Network (VPN)
Team members connect to corporate resources remotely through a secure tunnel, preventing unauthorized parties from spying on sensitive communications.
413
Virus
Malicious code attaches to other files and spreads whenever they’re shared or executed, often harming data or system performance.
414
VirusTotal
Security teams upload questionable files to a multi-engine scanning service, comparing results from different antivirus solutions for thorough checks.
415
Vishing
An imposter calls, claiming urgent action from a bank or government office, hoping the target reveals private details like account pins or social security numbers.
416
Visual dashboard
Managers see a real-time overview of server loads, security alerts, and user statistics without diving into raw logs or technical readouts.
417
Vulnerability
A newly discovered flaw in a web plugin can allow someone to bypass login screens, potentially opening an unauthorized path into the site.
418
Vulnerability assessment
Automated scans and manual checks reveal software weaknesses, insecure configurations, or missing patches, ranking them by severity for prioritization.
419
Vulnerability management
A company methodically tackles found weaknesses by testing, applying updates, and monitoring for new issues, cycling through continuous improvement.
420
Vulnerability scanner
Automated software references a database of known flaws, probing devices to see if they match any exploitable conditions or missing patches.
421
Watering hole attack
A popular site frequented by a particular industry is sabotaged, hoping key professionals unknowingly install malicious code when they visit.
422
Web-based exploits
Threat actors trick a user into clicking a harmful link or loading a compromised page, taking advantage of unpatched browser flaws to run code.
423
Whaling
A high-level executive gets a customized extortion or wire-transfer scam referencing specific internal knowledge, aiming for a large payout from a single strike.
424
Wide Area Network (WAN)
A corporation ties together branches across the country, enabling shared resources and communication despite physical distance.
425
Wi-Fi Protected Access (WPA)
Modern wireless configurations require passphrases for encrypted sessions, significantly reducing eavesdropping or unauthorized usage of the network.
426
Wildcard
A search parameter such as *.pdf matches any file name that ends with .pdf, simplifying broad retrieval or command operations on multiple files at once.
427
Wireshark
An engineer inspects captured traffic data, identifying latency issues, protocol errors, or suspicious transmissions in a user-friendly graphical tool.
428
World-writable file
Any user on a shared system can alter a particular resource, potentially enabling sabotage or the introduction of harmful scripts if not monitored.
429
Worm
An automated malicious entity scans for vulnerabilities and copies itself, requiring no human interaction to leap from system to system.
430
YARA-L
Security researchers define rule sets that scan files or logs for specific textual or behavioral patterns consistent with advanced malware families.
431
Zero-day
A glitch in software is publicized before developers release an official fix, leaving users temporarily exposed to attackers exploiting the weakness.