Deck Two Flashcards

1
Q

The interconnection of electronic devices embedded in everyday or specialized objects, enabling them to sense, collect, process, and transmit data. IoT devices include wearable fitness trackers, “smart” appliances, home automation devices, wireless health devices, and cars—among many others.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A system or software that monitors and analyzes network or system events for the purpose of finding and providing real-time or near real-time warning of attempts to access system resources in an unauthorized manner. In addition, intrusion prevention systems can also attempt to stop the activity, ideally before it reaches its targets.

A

Intrusion Detection System/Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer program that is covertly placed onto a computer or electronic device with the intent to compromise the confidentiality, integrity, or availability of data, applications, or operating systems. Common types of malware include viruses, worms, malicious mobile code, Trojan horses, rootkits, spyware, and some forms of adware.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication using two or more different factors to provide increased security during log-ins. Factors may include: (i) something you know (e.g., password/PIN); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).

A

Multi-factor Authentication/Two-Factor Authentication/Dual Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An information system implemented with a collection of interconnected components such as computers, routers, hubs, cabling, and telecommunications controllers.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Splitting a network into sub-networks, for example, by creating separate areas on the network which are protected by firewalls configured to reject unnecessary traffic. Network segmentation minimizes the harm of malware and other threats by isolating it to a limited part of the network.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A widely used, risk-based approach to managing cybersecurity composed of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. The Cybersecurity Framework includes references to standards, guidelines, and best practices. The Framework is voluntary for private sector use; federal agencies must use this risk management approach.9

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The software “master control application” that runs a computer or electronic device.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The software “master control application” that runs a computer or electronic device.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A secret sequence of words or other text used to authenticate a person’s or system’s identity. A passphrase is similar to a password but is generally longer for added security.

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A secret string of characters (letters, numbers, and other symbols) used to authenticate an identity, to verify access authorization or to derive cryptographic keys.

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A “repair job” for a piece of programming, also known as a “fix.” When a software developer or distributor learns of a security weakness, a patch is the usual immediate solution that is provided to users and can sometimes be downloaded from the software maker’s web site.

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, system, or network. Penetration testing often involves issuing real attacks on real systems and data, using the same tools and techniques used by actual attackers. Most penetration tests involve looking for combinations of vulnerabilities on a single system or multiple systems that can be used to gain more access than could be achieved through a single vulnerability.

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information which can be used to distinguish or trace the identity of an individual (e.g., name, social security number, biometric records, etc.) alone, or when combined with other personal or identifying information which is linkable to a specific individual (e.g., date and place of birth, mother’s maiden name, etc.).

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technique for attempting to acquire sensitive data, such as bank account numbers, or access to a larger computerized system through a fraudulent solicitation in email or on a web site. The perpetrator typically masquerades as a legitimate business or reputable person.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical measures, policies, and procedures to protect an entity’s electronic information systems and related buildings and equipment from natural/environmental hazards and unauthorized intrusion.

A

Physical Security/Safeguards

17
Q

Digital privacy is more than the security of personal information. It also covers the processing of information about individuals for a business’ operational purposes throughout the information lifecycle (from collection through disposal) and addressing risks that this processing could create for these individuals. These problems could range from embarrassment, discrimination, or loss of autonomy to more tangible harms such as identity theft or physical harm.

A

Privacy

18
Q

A type of malware that attempts to deny access to a user’s data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid.10

A

Ransomware

19
Q

Access to an organization’s information system by a user (or a process acting on behalf of a user) communicating through an external network (e.g., the Internet).

A

Remote Access

20
Q

The extent to which an entity is threatened by a potential circumstance or event. Risk typically is a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. Information system-related security risks arise from the loss of confidentiality, integrity, or availability of information or information systems. These risks reflect the potential adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.

A

Risk

21
Q

The program and supporting processes to manage information security risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation. Risk management includes: (i) establishing the context for risk-related activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.

A

Risk Management

22
Q

Router
A device that allows communication between different networks. Routers determine the best path for forwarding data to its destination.

A
23
Q

Forms of electronic communications, including websites and applications, that enable users to create and share content or to participate in social networking.

A

Social Media

24
Q

Electronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

A

Spam

25
Q

A highly targeted phishing attack, usually to a specific individual or department within an organization.

A

Spear phishing

26
Q

Software that is secretly or surreptitiously installed into an information system to gather information on individuals or organizations without their knowledge.

A

Spyware

27
Q

A security exploit in which scammers call, place alarming pop-up messages on a computer, offer free “security” scans, or set up fake websites to convince someone that his/her computer is infected or has a problem. The scammers then ask to be paid to fix the non-existent problem.11

A

Tech Support Scams

28
Q

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

Threat

29
Q

Type of standard cable, connector, or protocol for connecting computers, electronic devices, and power sources.

A

USB

30
Q

A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk.

A

Viruses

31
Q

Virtual network built on top of existing networks that can provide a secure communications mechanism for data and Internet Protocol (IP) information transmitted via the virtual network.

A

Virtual Private Network (VPN)

32
Q

A weakness in a system, application, or network that is subject to exploitation or misuse.

A

Vulnerability

33
Q

A security exploit where the attacker infects websites that are frequently visited by members of the group being attacked, with a goal of infecting a computer used by one of the targeted group when they visit the infected website.

A

Watering Hole Attack

34
Q

An approved list or register of entities provided a particular privilege, service, mobility, access, or recognition.

A

Whitelist

35
Q

Overwriting media (like a hard drive) or portions of media to hinder reconstruction of the data.

A

Wiping

36
Q

A generic term that refers to a wireless local area network that follows the IEEE 802.11 protocol. Wireless capabilities allow computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.

A

Wireless (WiFi)