General Terms Flashcards
Absolute file path?
The full file path, which starts from the root
Access Controls?
Security controls that manage access, authorization, and accountability of information
Active Packet sniffing?
A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP)?
A network protocol used to determine the MAC address of the next router or device on the path
Advanced Persistent Threat (APT)?
An instance when a threat actor maintains unauthorized access to a system for an extended period of time
Adversarial Artificial Intelligence (AI)?
A technique that manipulates artificial
intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adware?
A type of legitimate software that is sometimes used to display digital
advertisements in applications
Algorithm?
A set of rules used to solve a problem.
Analysis?
The investigation and validation of alerts
Angler Phishing?
A technique where attackers impersonate customer service
representatives on social media
Anomaly-based Analysis?
A detection method that identifies abnormal behavior
Antivirus Software?
A software program used to prevent, detect, and eliminate
malware and viruses
Application?
A program that performs a specific task
Application Programming Interface (API) token?
A small block of encrypted code
that contains information about a user
Argument (Linux) ?
Specific information needed by a command
Argument (Python)?
The data brought into a function when it is called
Array?
A data type that stores data in a comma-separated ordered list
Assess?
The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly
Asset?
An item perceived as having value to an organization
Asset Classification?
The practice of labeling assets based on sensitivity and
importance to an organization
Asset Inventory?
A catalog of assets that need to be protected
Asset Management?
The process of tracking assets and the risks that affect them
Asymmetric encryption?
The use of a public and private key pair for encryption and
decryption of data
Attack Surface?
All the potential vulnerabilities that a threat actor could exploit
Attack Tree?
A diagram that maps threats to assets
Attack Vectors?
The pathways attackers use to penetrate security defenses
Authentication?
The process of verifying who someone is
Authorization?
The concept of granting access to specific resources in a system
Authorize?
The sixth step of the NIST RMF that refers to being accountable for the
security and privacy risks that might exist in an organization
Automation?
The use of technology to reduce human and manual effort to perform
common and repetitive tasks
Availability?
The idea that data is accessible to those who are authorized to access it
Baiting?
A social engineering tactic that tempts people into compromising their
security
Bandwidth?
The maximum data transmission capacity over a network, measured by
bits per second
Baseline Configuration (baseline image)?
A documented set of specifications within
a system that is used as a basis for future builds, releases, and updates
Bash?
The default shell in most Linux distributions
Basic Auth?
The technology used to establish a user’s request to access a server
Basic Input/Output System (BIOS)
A microchip that contains loading instructions for
the computer and is prevalent in older systems
Biometrics?
The unique physical characteristics that can be used to verify a person’s
identity
Bit?
The smallest unit of data measurement on a computer
Boolean Data?
Data that can only be one of two values: either True or False
Bootloader?
A software program that boots the operating system
Botnet?
A collection of computers infected by malware that are under the control of a
single threat actor, known as the “bot-herder”
Bracket Notation?
The indices placed in square brackets
Broken Chain of Custody?
Inconsistencies in the collection and logging of evidence in
the chain of custody
Brute force Attack?
The trial and error process of discovering private information
Bug Bounty?
Programs that encourage freelance hackers to find and report
vulnerabilities
Built-in Function?
A function that exists within Python and can be called directly
Business Continuity?
An organization’s ability to maintain their everyday productivity
by establishing risk disaster recovery plans
Business Continuity Plan (BCP)?
A document that outlines the procedures to sustain
business operations during and after a significant disruption
Business Email Compromise (BEC)?
A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage
Categorize?
The second step of the NIST RMF that is used to develop risk
management processes and tasks
CentOS?
An open-source distribution that is closely related to Red Hat
Central Processing Unit (CPU)?
A computer’s main processor, which is used to
perform general computing tasks on a computer
Chain of Custody?
The process of documenting evidence possession and control
during an incident lifecycle
Chronicle?
A cloud-native tool designed to retain, analyze, and search data
Cipher?
An algorithm that encrypts information
Cloud-based Firewalls?
Software firewalls that are hosted by the cloud service
provider
Cloud Computing?
The practice of using remote servers, applications, and network
services that are hosted on the internet instead of on local physical devices
Cloud Network?
A collection of servers or computers that stores resources and data in
remote data centers that can be accessed via the internet
Cloud Security?
The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users
Command?
An instruction telling the computer to do something
Command and Control (C2)?
The techniques used by malicious actors to maintain
communications with compromised systems
Command-line Interface (CLI)?
A text-based user interface that uses commands to
interact with the computer
Comment?
A note programmers make about the intention behind their code
Common Event Format (CEF)?
A log format that uses key-value pairs to structure
data and identify fields and their corresponding values
Common Vulnerabilities and Exposures (CVE) list?
An openly accessible dictionary
of known vulnerabilities and exposures
Common Vulnerability Scoring System (CVSS)?
A measurement system that scores
the severity of a vulnerability
Compliance?
The process of adhering to internal standards and external regulations
Computer Security Incident Response Teams (CSIRT)?
A specialized group of
security professionals that are trained in incident management and response
Computer Virus?
Malicious code written to interfere with computer operations and
cause damage to data and software
Conditional Statement?
A statement that evaluates code to determine if it meets a
specified set of conditions
Confidentiality?
The idea that only authorized users can access specific assets or data
Confidential Data?
Data that often has limits on the number of people who have
access to it
Confidentiality, Integrity, Availability (CIA) Triad?
A model that helps inform how
organizations consider risk when setting up systems and security policies
Configuration File?
A file used to configure the settings of an application
Containment?
The act of limiting and preventing additional damage caused by an
incident
Controlled Zone?
A subnet that protects the internal network from the uncontrolled
zone
Cross-Site Scripting (XSS)
An injection attack that inserts code into a vulnerable
website or web application
Crowdsourcing?
The practice of gathering information using public input and
collaboration
Cryptographic Attack?
An attack that affects secure forms of communication
between a sender and intended recipient
Cryptographic Key?
A mechanism that decrypts ciphertext
Cryptography?
The process of transforming information into a form that unintended
readers can’t understand
Cryptojacking?
A form of malware that installs software to illegally mine
cryptocurrencies
CVE Numbering Authority (CNA)?
An organization that volunteers to analyze and
distribute information on eligible CVEs
Cybersecurity (or security)?
The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation
Data?
Information that is translated, processed, or stored by a computer
Data at Rest?
Data not currently being accessed
Database?
An organized collection of information or data
Data Controller?
A person that determines the procedure and purpose for processing
data
Data Custodian?
Anyone or anything that’s responsible for the safe handling,
transport, and storage of information
Data Exfiltration?
Unauthorized transmission of data from a system
Data in Transit?
Data traveling from one point to another
Data in use?
Data being accessed by one or more users
Data Owner?
The person who decides who can access, edit, use, or destroy their
information
Data Packet?
A basic unit of information that travels from one device to another within
a network
Data Point?
A specific piece of information
Data Processor?
A person that is responsible for processing data on behalf of the data
controller
Data Protection Officer (DPO)?
An individual that is responsible for monitoring the
compliance of an organization’s data protection procedures
Data Type?
A category for a particular type of data item
Date and Time Data?
Data representing a date and/or time
Debugger?
A software tool that helps to locate the source of an error and assess its
causes
Debugging?
The practice of identifying and fixing errors in code
Defense in Depth?
A layered approach to vulnerability management that reduces risk
Denial of Service (DoS) Attack?
An attack that targets a network or server and floods
it with network traffic
Detect?
A NIST core function related to identifying potential security incidents and
improving monitoring capabilities to increase the speed and efficiency of detections
Detection?
The prompt discovery of security events
Dictionary Data?
Data that consists of one or more key-value pairs
Digital Certificate?
A file that verifies the identity of a public key holder
Digital Forensics?
The practice of collecting and analyzing data to determine what has
happened after an attack
Directory?
A file that organizes where other files are stored
Disaster Recovery Plan?
A plan that allows an organization’s security team to outline
the steps needed to minimize the impact of a security incident
Distributed Denial of Service (DDoS) attack?
A type of denial or service attack that
uses multiple devices or servers located in different locations to flood the target
network with unwanted traffic
Distributions?
The different versions of Linux
Documentation?
Any form of recorded content that is used for a specific purpose
DOM-based XSS attack?
An instance when malicious script exists in the webpage a
browser loads
Domain Name System (DNS)?
A networking protocol that translates internet domain
names into IP addresses
Dropper?
A program or a file used to install a rootkit on a target computer
Elevator Pitch?
A brief summary of your experience, skills, and background
Encapsulation?
A process performed by a VPN service that protects your data by
wrapping sensitive data in other data packets
Encryption?
The process of converting data from a readable format to an encoded
format
Endpoint?
Any device connected on a network
Endpoint Detection and Response (EDR)
An application that monitors an endpoint
for malicious activity
Eradication?
The complete removal of the incident elements from all affected systems
Escalation Policy?
A set of actions that outline who should be notified when an
incident alert occurs and how that incident should be handled
Event?
An observable occurrence on a network, system, or device
Exception?
An error that involves code that cannot be executed even though it is
syntactically correct
Exclusive Operator?
An operator that does not include the value of comparison
Exploit?
A way of taking advantage of a vulnerability
Exposure?
A mistake that can be exploited by a threat
External Threat?
Anything outside the organization that has the potential to harm
organizational assets
False Negative?
A state where the presence of a threat is not detected
False Positive?
An alert that incorrectly detects the presence of a threat
Fileless Malware?
Malware that does not need to be installed by the user because it
uses legitimate programs that are already installed to infect a computer
File Path?
The location of a file or directory
Filesystem Hierarchy Standard (FHS)?
The component of the Linux OS that organizes
data
Filtering?
Selecting data that match a certain condition
Final Report?
Documentation that provides a comprehensive review of an incident
Firewall?
A network security device that monitors traffic to or from a network
Float Data?
Data consisting of a number with a decimal point
Foreign Key?
A column in a table that is a primary key in another table
Forward Proxy Server?
A server that regulates and restricts a person’s access to the
internet
Function?
A section of code that can be reused in a program
Global Variable?
A variable that is available through the entire program
Graphical User Interface (GUI)?
A user interface that uses icons on the screen to
manage different tasks on the computer
Hacker?
Any person or group who uses computers to gain unauthorized access to
data
Hacktivist?
A person who uses hacking to achieve a political goal
Hard Drive?
A hardware component used for long-term memory
Hardware?
The physical components of a computer
Hash Collision?
An instance when different inputs produce the same hash value
Hash Function?
An algorithm that produces a code that can’t be decrypted
Hash Table?
A data structure that’s used to store and reference hash values
Health Insurance Portability and Accountability Act (HIPAA)?
A U.S. federal law
established to protect patients’ health information
Honeypot?
A system or resource created as a decoy vulnerable to attacks with the
purpose of attracting potential intruders
Host-based Intrusion Detection System (HIDS)?
An application that monitors the
activity of the host on which it’s installed
Hub?
A network device that broadcasts information to every device on the network
Hypertext Transfer Protocol (HTTP)?
An application layer protocol that provides a
method of communication between clients and website servers
Hypertext Transfer Protocol Secure (HTTPS)?
A network protocol that provides a
secure method of communication between clients and website servers
Identify?
A NIST core function related to management of cybersecurity risk and its
effect on an organization’s people and assets
Identity and Access Management (IAM)?
A collection of processes and technologies
that helps organizations manage digital identities in their environment
IEEE 802.11 (Wi-Fi)?
A set of standards that define communication for wireless LANs
Immutable?
An object that cannot be changed after it is created and assigned a value
Implement?
The fourth step of the NIST RMF that means to implement security and
privacy plans for an organization
Improper Usage?
An incident type that occurs when an employee of an organization
violates the organization’s acceptable use policies
Incident?
An occurrence that actually or imminently jeopardizes, without lawful
authority, the confidentiality, integrity, or availability of information or an information
system; or constitutes a violation or imminent threat of violation of law, security
policies, security procedures, or acceptable use policies
Incident Escalation?
The process of identifying a potential security incident, triaging it,
and handing it off to a more experienced team member
Incident Handler’s Journal?
A form of documentation used in incident response
Incident Response?
An organization’s quick attempt to identify an attack, contain the
damage, and correct the effects of a security breach
Incident Response Plan?
A document that outlines the procedures to take in each step
of incident response
Inclusive Operator?
An operator that includes the value of comparison
Indentation?
Space added at the beginning of a line of code
Index?
A number assigned to every element in a sequence that indicates its position
Indicators of attack (IoA) ?
The series of observed events that indicate a real-time
incident
Indicators of compromise (IoC)?
Observable evidence that suggests signs of a
potential security incident
Information Privacy?
The protection of unauthorized access and distribution of data
Information Security (InfoSec)?
The practice of keeping data in all states away from
unauthorized users
Injection Attack?
Malicious code inserted into a vulnerable application
Input Validation?
Programming that validates inputs from users and other programs
Integer Data?
Data consisting of a number that does not include a decimal point.
Integrated Development Environment (IDE)?
A software application for writing code
that provides editing assistance and error correction tools
Integrity?
The idea that the data is correct, authentic, and reliable
Internal Hardware?
The components required to run the computer
Internal Threat?
A current or former employee, external vendor, or trusted partner who
poses a security risk
Internet Control Message Protocol (ICMP)?
An internet protocol used by devices to
tell each other about data transmission errors across the network
Internet Control Message Protocol Flood (ICMP flood)?
A type of DoS attack
performed by an attacker repeatedly sending ICMP request packets to a network
server
Internet Protocol (IP)?
A set of standards used for routing and addressing data
packets as they travel between devices on a network
Internet Protocol (IP) Address?
A unique string of characters that identifies the
location of a device on the internet
Interpreter?
A computer program that translates Python code into runnable
instructions line by line
Intrusion Detection System (IDS)?
An application that monitors system activity and
alerts on possible intrusions
Intrusion Prevention System (IPS)?
An application that monitors system activity for
intrusive activity and takes action to stop the activity
IP Spoofing?
A network attack performed when an attacker changes the source IP of a
data packet to impersonate an authorized system and gain access to a network
Iterative Statement?
Code that repeatedly executes a set of instructions
Kali Linux?
An open-source distribution of Linux that is widely used in the security
industry
Kernel?
The component of the Linux OS that manages processes and memory
Key-value pair?
A set of data that represents two linked items: a key, and its
corresponding value
Legacy Operating System?
An operating system that is outdated but still being used
Lessons Learned Meeting?
A meeting that includes all involved parties after a major
incident
Library?
A collection of modules that provide code users can access in their programs
Linux?
An open-source operating system
List Concatenation?
The concept of combining two lists into one by placing the
elements of the second list directly after the elements of the first list
List Data?
Data structure that consists of a collection of data in sequential form
Loader?
Malicious code that launches after a user initiates a dropper program
Local Area Network (LAN)?
A network that spans small areas like an office building, a
school, or a home
Local Variable?
A variable assigned within a function
Log?
A record of events that occur within an organization’s systems
Log Analysis?
The process of examining logs to identify events of interest
Logging?
The recording of events occurring on computer systems and networks
Logic Error?
An error that results when the logic used in code produces unintended
results
Log Management?
The process of collecting, storing, analyzing, and disposing of log
data
Loop Condition?
The part of a loop that determines when the loop terminates
Loop Variable?
A variable that is used to control the iterations of a loop
Malware?
Software designed to harm devices or networks
Malware Infection?
An incident type that occurs when malicious software designed to
disrupt a system infiltrates an organization’s computers or network
Media Access Control (MAC) Address?
A unique alphanumeric identifier that is
assigned to each physical device on a network
Method?
A function that belongs to a specific data type
Metrics?
Key technical attributes such as response time, availability, and failure rate,
which are used to assess the performance of a software application
MITRE?
A collection of non-profit research and development centers
Modem?
A device that connects your router to the internet and brings internet access
to the LAN
Module?
A Python file that contains additional functions, variables, classes, and any
kind of runnable code
Monitor?
The seventh step of the NIST RMF that means be aware of how systems are
operating
Multi-factor Authentication (MFA)?
A security measure that requires a user to verify
their identity in two or more ways to access a system or network
Nano?
A command-line file editor that is available by default in many Linux distributions
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?
A voluntary framework that consists of standards, guidelines, and best
practices to manage cybersecurity risk
National Institute of Standards and Technology (NIST) Incident Response?
A framework for incident response consisting of four phases: Preparation;
Detection and Analysis; Containment, Eradication and Recovery, and Post-incident
activity