Foundations of Cyber Security Flashcards

1
Q

Cybersecurity

A

_____ is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Security

A

_____ is the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transferable skills

A

Skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adversarial artificial intelligence (AI):

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Email Compromise (BEC):

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISSP

A

Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Password attack

A

An attempt to access password secured devices, systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Social Media Phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Spear Phishing
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
26
Supply-Chain attack
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
27
USB baiting
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
28
Virus
refer to “computer virus”
29
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
30
Watering hole attack
A type of attack when a threat actor compromises a website frequently visited by a specific group of users
31
Asset
An item perceived as having value to an organization
32
Availability
The idea that data is accessible to those who are authorized to access it
33
Compliance
The process of adhering to internal standards and external regulations
34
Confidentiality
The idea that only authorized users can access specific assets or data
35
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
36
Hacktivist
A person who uses hacking to achieve a political goal
37
Health Insurance Portability and Accountability Act (HIPPA)
A U.S. federal law established to protect patients' health information
38
Integrity
The idea that the data is correct, authentic, and reliable
39
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
40
Privacy Protection
The act of safeguarding personal information from unauthorized use
41
Security architecture
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
41
Security ethics
Guidelines for making appropriate decisions as a security professional
41
Security controls
Safeguards designed to reduce specific security risks
41
Protected health information (PHI)
Information that relates to the past, present, or future physical or mental health or condition of an individual
42
Security frameworks
Guidelines used for building plans to help mitigate risk and threats to data and privacy
43
Security governance
Practices that help support, define, and direct security efforts of an organization
44
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines
45
Antivirus software
A software program used to prevent, detect, and eliminate malware and viruses
46
Database
An organized collection of information or data
47
Data point
A specific piece of information
48
Intrusion detection system (IDS)
An application that monitors system activity and alerts on possible intrusions
49
Linux
An open-source operating system
50
Log
A record of events that occur within an organization’s systems
51
Network protocol analyzer (packet sniffer)
A tool designed to capture and analyze data traffic within a network
52
Order of volatility
A sequence outlining the order of data that must be preserved from first to last
53
Programming
A process that can be used to create a specific set of instructions for a computer to execute tasks
54
Protecting and preserving evidence
The process of properly working with fragile and volatile digital evidence
55
Security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization
56
SQL (Structured Query Language)
A query language used to create, interact with, and request information from a database
57
_____ is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cybersecurity
58
_____ is the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Cloud Security
59
A current or former employee, external vendor, or trusted partner who poses a security risk
Internal threat
60
The practice of keeping an organization's network infrastructure secure from unauthorized access
Network Security
61
Any information used to infer an individual’s identity
Personally identifiable information (PII)
62
An organization’s ability to manage its defense of critical assets and data and react to change
Security posture
63
A specific type of PII that falls under stricter handling guidelines
Sensitive personally identifiable information (SPII)
64
Skills that require knowledge of specific tools, procedures, and policies
Technical skills
65
Any circumstance or event that can negatively impact assets
Threat
66
Any person or group who presents a security risk
Threat actor
67
Skills from other areas that can apply to different careers
Transferable skills
68
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adversarial artificial intelligence (AI):
69
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
Business Email Compromise (BEC):
70
Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium
CISSP
71
Malicious code written to interfere with computer operations and cause damage to data and software
Computer Virus
72
An attack that affects secure forms of communication between a sender and intended recipient
Cryptographic attack
73
Any person who uses computers to gain access to computer systems, networks, or data
Hacker
74
Software designed to harm devices or networks
Malware
75
An attempt to access password secured devices, systems, networks, or data
Password attack
76
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
Phishing
77
A security incident that affects not only digital but also physical environments where the incident is deployed
Physical attack
78
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
Physical social engineering
79
A manipulation technique that exploits human error to gain private information, access, or valuables
Social engineering
80
A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
Social Media Phishing
81
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
Spear Phishing
82
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
Supply-Chain attack
83
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
USB baiting
84
refer to “computer virus”
Virus
85
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
Vishing
86
A type of attack when a threat actor compromises a website frequently visited by a specific group of users
Watering hole attack
87
An item perceived as having value to an organization
Asset
88
The idea that data is accessible to those who are authorized to access it
Availability
89
The process of adhering to internal standards and external regulations
Compliance
90
The idea that only authorized users can access specific assets or data
Confidentiality
91
A model that helps inform how organizations consider risk when setting up systems and security policies
Confidentiality, integrity, availability (CIA) triad
92
A person who uses hacking to achieve a political goal
Hacktivist
93
A U.S. federal law established to protect patients' health information
Health Insurance Portability and Accountability Act (HIPPA)
94
The idea that the data is correct, authentic, and reliable
Integrity
95
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)
96
The act of safeguarding personal information from unauthorized use
Privacy Protection
97
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
Security architecture
98
Guidelines for making appropriate decisions as a security professional
Security ethics
99
Safeguards designed to reduce specific security risks
Security controls
100
Information that relates to the past, present, or future physical or mental health or condition of an individual
Protected health information (PHI)
101
Guidelines used for building plans to help mitigate risk and threats to data and privacy
Security frameworks
102
Practices that help support, define, and direct security efforts of an organization
Security governance
103
A specific type of PII that falls under stricter handling guidelines
Sensitive personally identifiable information (SPII)
104
A software program used to prevent, detect, and eliminate malware and viruses
Antivirus software
105
An organized collection of information or data
Database
106
A specific piece of information
Data point
107
An application that monitors system activity and alerts on possible intrusions
Intrusion detection system (IDS)
108
An open-source operating system
Linux
109
A record of events that occur within an organization’s systems
Log
110
A tool designed to capture and analyze data traffic within a network
Network protocol analyzer (packet sniffer)
111
A sequence outlining the order of data that must be preserved from first to last
Order of volatility
112
A process that can be used to create a specific set of instructions for a computer to execute tasks
Programming
113
The process of properly working with fragile and volatile digital evidence
Protecting and preserving evidence
114
An application that collects and analyzes log data to monitor critical activities in an organization
Security information and event management (SIEM)
115
A query language used to create, interact with, and request information from a database
SQL (Structured Query Language)