Cybersecurity Flashcards
Network
security
The range of measures that can
be taken to protect network
data from accidental or
malicious damage.
Encryption
Conversion of data, using an algorithm, into cyphertext that cannot be understood by people without the decryption key.
Compression
The process of reducing file
size to allow more data to be
stored on the disk and increase
transfer speeds.
Backup
A copy of data that can be used
if the original data is lost.
Archiving
The process of storing data that
is not in current use for security,
legal or historical reasons.
Cybersecurity
The range of measures that can
be taken to protect computer
systems from cyberattack.
Cyberattack
An attempt to expose, alter, disable, destroy, steal or gain unauthorized access to data on a computer system or smart device.
Malware
MALicious softWARE; the term
used for any kind of computer
software written to enable a
cyberattack
Vulnerabilities
Software security flaws or holes
that are fixed via the release of
patches
Cookies
Data downloaded from a
website that allows the website
to identify the computer in
future.
SQL Injection
Injected SQL commands can alter SQL
statements and compromise the security of
information held in a database.
Denial of
Service (DoS)
Making a website and servers unavailable to
legitimate users, by swamping a system with
fake requests.
Password
attacks
Brute force or dictionary attacks to discover
passwords
SQL Injection
Injected SQL commands can alter SQL
statements and compromise the security of
information held in a database.
IP Spoofing
Changing the IP address of a site so that a
visitor is taken to a fraudulent or spoofed web
page