Cyber Security Flashcards
Terminology
Blacklist
Used to refer to a list of banned IP addresses, application or users.
Whitelist
The exact opposite of a blacklist
Cat Fishing
The process of creating a fake profile in order to trick people into believing they are someone else for financial gain.
Authentication
The process of proving an individual is who they claim to be.
Data Mining
The activity of analyzing and/or searching through data in order to find items of relevance, significance of value.
Threat
This generally refers to anything that has the potential to cause our data, systems and networks harm.
Exploit
A clearly defined way to breach the security of a system.
Vulnerabilities
These are weakness within a system or network that can be exploited to cause us harm.
Risk
This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist.
Zero Data
This is used to describe a threat that is unknown to security specialist and has not been addressed.
Hack Value
This is used to describe a target that may attract an above average level of attention from an attacker.
Non-Repundiation
This is the concept that once an action is carried out by a party it cannot be denied by that same party.
Logic Bomb
A malicious code that is only triggered when a set of conditions are met.
Obfuscation
A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it.
Honey Pot
A decoy or trap for hackers.
Spoof
The act of falsifying the identity of the source of a communication or interaction.
What is the CIA Triad?
Confidentiality
Integrity
Availability
Confidentiality
Ensuring that data is private and accessed only by those with permission to do so. Can be achieved with the use of passwords, biometrics and encryption.
Integrity
Ensuring that data has not been altered in any way. Can be achieved though the use of checksums and access control.
Availability
Ensuring that data is always available for access and use. Can be achieved though the use of backups, maintenance & disaster recovery plans.