Cyber Security for Beginners - glossary Flashcards
Acceptable use policy
A set of wording describes an agreement between any user and the enterprise that owns the service, application or device being accessed. The agreement usually defines both the primary permitted and prohibited activities.
Access controls
Rules and techniques used to manage and restrict entry to or exit from a physical, virtual or digital area through the use of permissions
APT
Advanced Persistent Threats, a term used to describe the tenacious and highly evolved set of tactics used by hackers to infiltrate networks through digital devices.
Adware
Any computer program designed to render adverts to an end user. Considered malware.
Air gap
to use some form of physical and electronic separation to ensure that activities in one are canoot impact or infect activities in another.
Alert status
An escalation flag that can be assigned to a security incident to indicate that it cannot be managed inside allowable time limits or other acceptable tolerances.
Anti-malware
A computer progeram designed to look for specific files and behaviours that indicate the presence or attempted installation of malware.
Anti-virus
Predecessor of anti-malware that was used before the nature of malware had diversifided.
Application
a collection of functions and instructions in electronic format.
asset
any item that has inherent value
attack
the occurance of unatuhorized intrusion
attack surface
the sum of the potential exposure area that could be used to gain unauthorized entry to any part of a digital landscape. This area usually includes perimeter network hardware and web servers.
Audits
The use of independent examiners to check if a target product, service and/or location is meeting the specific required standards.
Backdoor
a covert method of accessing software or a device that bypasses normal authentication requirements
Black box penetration testing
It is the term used to describe a situation in which no advance information about the technical details of a computer programs has been made available to the pen-testers?
Black hat
A hacker with unethical goals, or no perceived ethical goals.
Bleeding edge
using inventions so new , they have the likelihood to cause damage to their population before they become stable or safe
BGP
Border Gateway Protocol is a standard format that different systems on a network can use to share and make decisions about the path for information being transmitted.
Breach notification procedure
Some types of information, when suspected or known to be lost or stolen, must, by law be reporter to one or more autorities.
Brute force,
A systematic approach that can quickly generate large volumes of possible methods to gain unauthorized access.
Buffer overflow
Exceeding the region of electronic memory used to store data temporarily when it is being moved between locations
BCP
Business Continuity Plan an operational document that describes how an organization can restore its critical products or services.