Cybersecurity Flashcards
Cybersecurity, malware, etc.
What is the practice of protecting systems, networks, and programs from attacks?
Cybersecurity
What type of attack involves hackers demanding money?
Ransomware
What is the process of converting data into unreadable text?
Encryption
What is the standard encryption method used by banks?
AES (Advanced Encryption Standard)
What cybersecurity principle ensures only authorized users can access data?
Confidentiality
What is the process of verifying a user’s identity?
Authentication
What is the process of ensuring data remains unchanged?
Integrity
What cybersecurity measure prevents unauthorized access to a network?
Firewall
What technique is used to guess passwords by trying many possibilities?
Brute Force Attack
What method tricks people into giving up personal information?
Phishing
What security protocol ensures encrypted website communication?
TLS (Transport Layer Security)
What is the cybersecurity term for an unknown software vulnerability?
Zero-Day Exploit
What is the unauthorized process of gaining access to a system?
Hacking
What is the cybersecurity term for testing security vulnerabilities?
Penetration Testing
What is the cybersecurity term for malicious software?
Malware
What type of malware disguises itself as legitimate software?
Trojan Horse
What type of malware spreads by itself through a network?
Worm
What type of malware records keystrokes?
Keylogger
What attack floods a network with traffic?
DDoS (Distributed Denial-of-Service)
What attack injects malicious code into a website?
SQL Injection
What is the cybersecurity term for unauthorized modifications to software?
Tampering
What cybersecurity principle restricts user privileges?
Least Privilege
What software detects and removes malware?
Antivirus
What attack involves an attacker sitting between two communicating parties?
Man-in-the-Middle (MITM) Attack