Cybersecurity Important Terms Flashcards

1
Q

Encryption

A

The process of converting information or data into a code, especially to prevent unauthorized access.
-Cornerstone of data protection.
-Different types of encryption
-Pay attention to depreciated encryption meaning too weak Sha-1 depreciated, AS256 or AS128 are good.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Single Sign-On

A

An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-Factor Authentication

A

An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism:
knowledge, possession, inherence, and location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intrusion Detection System (IDS)

A

IDS: A device or software application that monitors a network or systems for malicious activity or policy violations
- Critical in modern day networks to understand what is not normal behaviors.
-Notified someone to take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion Prevention System (IPS)

A

IPS: A network security tool (which can be a hardware device or
software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
- Critical in modern day networks to understand what is not normal behaviors.
- Can be programmed to take actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall

A

A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
-NGFW: Next Generation Fire Wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP Address

A

A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
-Address on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports

A

A process-specific or an application-specific software construct serving as a communication endpoint, which is used by the Transport Layer protocols of Internet Protocol suite, such as User Diagram Protocol (UDP) and Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domain Name System (DNS)

A

The hierarchical and decentralized naming system used to identify computers reachable through the Internet or other Internet Protocol networks. The domain name server (DNS) translates domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Access Control (NAC)

A

A security solution that enforces policy on devices that access
networks to increase network visibility and reduce risk.
-802.11X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shared Responsibility Model

A

A cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personally Identifiable Information (PII)

A

Information that, when used with one or more relevant sets of data, can identify an individual (such as name with email or address with birth date).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protected Health Information (PHI)

A

Information about the health status, provision of health care, and/or payment for health care that is created or collected by a Covered Entity, and can be linked to a specific individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advanced Persistent Threat (APT)

A

A stealthy threat actor, typically a nation state or state-sponsored
group, which gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Development Lifecycle (SDLC)

A

A systematic, multi-step process that streamlines software
development from inception to release. It’s an easy-to-follow step
by step procedural model that enables organizations to develop
software in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privileged Access Management (PAM)

A

Encompasses the policies, strategies, and technologies used to control and secure elevated access to critical resources
-Admin users, privileged access, elevated access, use ability to edit and change critical areas. Access to change areas.
-PAM users logs in and gives credentials. Need some kind of PAM program running.
-E.g. Sailpoint

17
Q

Event:

A

Any occurrence in an information system or network that has, or may potentially result in, unauthorized access, processing, corruption, modification, transfer or disclosure of data and/or Confidential Information.
- there’s an occurrence, potential authorized access, you don’t know what’s happened. We potentially know something happened, but we don’t know what happened.
-Can say event if not breach

18
Q

Incident:

A

Event vs. Incident. vs. Breach

A cybersecurity event that has been determined to have an impact on the organization prompting the need for response and recovery
-Determined there has been some impact that needs response and recovery
-E.g. short interruption of service. Something that’s had an impact and had to do something about it

19
Q

Breach:

A

Event vs. Incident. vs. Breach

An incident wherein information is stolen or taken from a system without the knowledge or authorization of the system’s owner
- something has been stolen. Stealing of information.

*A breach is a type of incident, but not all incidents are breaches.