Glossary Terms Flashcards
Cybersecurity (or Security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cloud security
The process of ensuring the assets stored in the cloud are properly configured, and access to those assets, is limited by authorized users
Internal threat
A current, or former employee, external vendor, or trusted partner, who poses our security risk
Network security
The practice of keeping in organizations network infrastructure secure from unauthorized access
Personally, identifiable information (PII)
Any information used to infer an individuals identity. includes: someone’s full name, date of birth, physical address, phone number, email address, Internet, protocol, IP address, and similar information 
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines. May include: Social Security numbers, medical, our financial information, and biometric data, such as facial recognition.
Technical skills
Skills that require knowledge of specific tools, procedures, and policies. Which include: programming, languages, secure, information, and event management (SIEM) tools, intrusion detection systems (IDSs), threat, landscape, knowledge, incident response.
Threat
Any circumstance, or event that can negatively impact assets
Threat actor
Any person or group represents a security risk
Transferable skills
Skills from other areas that can apply to different careers. Which includes: communication, collaboration, analysis, problem-solving.
Absolute file path
The full file path, which starts from the root
Access controls
Security controls that manage access, authorization, and accountability of information
Active packet sniffing
A type of attack where data packets are manipulated in transit
Address resolution protocol (ARP)
Network protocol used to determine the MAC ADDRESS OF THE NEXT ROUTER OR DEVICE TO TRAVERSE
Advanced persistent threat (APT)
An instance where a threat actor maintains unauthorized access to a system for an extended period of time
Adversarial artificial intelligence (AI)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adware
A type of legitimate software that is sometimes used to display digital advertisements in applications
Algorithm
A set of rules to solve a problem
Analysis
The investigation and validation of alerts
Angler phishing
A technique where attackers impersonate customer service representatives on social media 
Anomaly-based analysis
Detection method that identifies abnormal behavior
Antivirus software
A software program used to prevent, detect, and illuminate malware and viruses
Application
A program that performs a specific task
Application programming interface (API) token
A small block of encrypted code that contains information about a user
Argument (Linux)
Specific information needed by a command
Argument (python)
The data brought into a function when it is called
Array
Data type that stores data in a comma-separated ordered list
Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
Asset
An item perceived as having value to an organization
Asset classification
The practice of labeling assets based on sensitivity and importance to an organization
Asset inventory
A catalog of assets that need to be protected
Asset management
The process of tracking assets and the risks that affect them
Asymmetric encryption
The use of a public and private key pair for encryption and decryption of data
Attack surface
All the potential vulnerabilities that a threat actor could exploit
Attack tree
A diagram that maps threats to assets
Attack vectors
The pathways attackers used to penetrate security defenses
Authentication
The process of verifying who someone is
Authorization
The concept of granting access to specific resources in a system
Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization
Automation
The use of technology, to reduce human and manual effort to perform common and repetitive tasks
Availability
The idea that data is accessible to those who are authorized to access it
Baiting
A social engineering tactic that tempts people into compromising their security
Bandwidth
The amount of data a device receives every second
Baseline configuration (baseline image)
A documented set of specifications within a system that is used as a basis for future builds, releases, and updates
Bash
The default shell in most Linux distributions
Basic auth
The technology used to establish a users request to access a server
Basic input/output system (BIOS)
A microchip that contains loading instructions for the computer and is prevalent in older systems
Bootloader
A software program that boots the operating system
Biometrics
The unique physical characteristics that can be used to verify a persons identity
Boolean data
Data that can only be one of two values: either true or false
Botnet
A collection of computers infected by malware that are under the control of a single threat actor, known as a “bot-herder”
Bracket notation
The indices placed in square brackets
Broken chain of custody
Inconsistencies in the collection of logging of evidence in the chain of custody
Brute force attack
The trial and error process of discovering private information
Bug bounty
Programs that encourage freelance hackers to find and report vulnerabilities
Built-in function
A function that exists within python and can be called directly
Business email compromise (BEC)
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
Business continuity
An organizations ability to maintain their every day productivity by establishing risk disaster. Recovery plans.
Business continuity plan (BCP)
A document that outlines the procedures to sustain business operations during and after a significant disruption
Categorize
The second step of the NIST RMF that is used to develop risk management processes and tasks
CentOS
An open-source distribution that is closely related to red hat
Central processing unit (CPU)
A computers, main processor, which is used to perform general computing tasks on a computer
Chain of custody
The process of documenting evidence, possession and control during an incident lifecycle
Chronicle
A cloud-native tool, design to retain, analyze, and search data
Cipher
An algorithm that encrypts information
Cloud-based firewalls
Software firewalls that are hosted by the cloud service provider
Cloud computing
The practice of using remote servers, applications, and network services that are hosted on the Internet instead of on local physical devices
Cloud Network
A collection of servers or computers that stores resources, and data in remote data centers that can be access via the Internet
Command
And instruction telling the computer to do something
Command and control (C2)
The techniques used by malicious actors to maintain communications with compromised systems
Command-line interface (CLI)
A text-based user interface that uses commands to interact with the computer
Comment
A note programmers make about the intention behind their code
Common event format (CEF)
A log format that uses key-value pairs to instruct data and identify fields and their corresponding values
Common vulnerabilities and exposures (CVE) list
An openly accessible dictionary of known vulnerabilities and exposures
Common vulnerability scoring system (CVSS)
A measurement system that scores the severity of a vulnerability
Compliance
The process of adhering to internal standards and external regulations
Computer security incident response teams (CSIRT)
A specialized group of security professionals that are trained in incident management and response
Computer virus
Malicious code written to interfere with computer operations, and cause damage to data and software
Conditional statement
A statement that evaluates code to determine if it needs a specified set of conditions
Confidentiality
The idea that only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) Triad
A model that helps inform how organizations consider risk when setting up systems and security policies
Configuration file
A file used to configure the settings of an application
Containment
The act of limiting and preventing additional damage caused by an incident
Controlled zone
A subnet that protects the internal network from the uncontrolled zone
Cross-site scripting (XSS)
An injection attack that inserts code into a vulnerable website or web application
Crowdsourcing
The practice of gathering, information, music, public input, and collaboration
Cryptographic attack
An attack that affects secure forms of communication between a center and intended recipient
Cryptographic key
A mechanism that decrypts ciphertext
Cryptography
A process of transforming information into a form that unintended readers can’t understand
Cryptojacking
A form of malware that installs software to illegally mine crypto currencies
CVE numbering authority (CNA)
An organization, that volunteers to analyze and distribute information on eligible CVEs
Data
Information that is translated, processed, or stored by a computer
Data at rest
Data not currently being accessed
Data custodian
Anyone or anything that’s responsible for the safe handling, transport, and storage of information
Data exfiltration
Unauthorized transmission of data from a system
Data in transit
Data traveling from one point to another
Data in use
Data being accessed by one or more users
Data owner
The person who decides who can access, edit, use, or destroy their information
Data packet
A basic unit of information that travels from one device to another within a Network
Data point
A specific piece of information
Data type
A category for a particular type of data item
Database
An organized collection of information or data
Date and time data
Data, representing a date and/or time
Debugger
A software tool that helps to locate the source of an error and assess it causes
Debugging
A practice of identifying and fixing errors in code
Defense in depth
A layered approach to vulnerability management that reduces risk
Denial of service (DOS) attack
An attack that targets in network or server, and floods it with network traffic
Detect
A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detection
Detection
The prompt discovery of security events
Dictionary data
Data that consists of one or more key-value pairs
Digital certificate
A file that verifies the identity of a public key holder
Digital forensics
The practice of collecting and analyzing data to determine what has happened after an attack
Directory
A file that organizes where other files are stored
Distributed denial of service (DDOS) attack
A type of denial of service attack that uses multiple devices or servers to flood the target network with unwanted traffic
Distributions
The different versions of Linux
Documentation
Any form of recorded content that is used for specific purpose
DOM-based XSS attack
An instant when malicious script exists in the webpage a browser loads
Domain name system (DNS)
A networking protocol that translates Internet domain names into IP addresses
Elevator pitch
A brief summary of a persons experience, skills, and background
Encapsulation
A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets
Encryption
The process of converting data from a readable format to an encoded format
Endpoint
Any device connected on a Network
Endpoint detection and response (EDR)
An application that monitors an endpoint for malicious activity
Eradication
The complete removal of the incident elements from all affected systems
Escalation policy
A set of actions that outline who should be notified when an incident alert, occurs and how that incident should be handled
Event
An observable occurrence on a network, system or device
Exception
An error that involves code that cannot be executed even though it is syntactically correct
Exclusive operator
An operator that does not include the value of comparison
Exploit
A way of taking advantage of a vulnerability
Exposure
A mistake that can be exploited by a threat
External threat
Anything outside the organization that has the potential to harm organizational assets
False negative
A state where the presence of a threat is not detected
False positive
An alert that incorrectly detect the presence of a threat
File path
The location of a file or directory
Fileless malware
Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer
Filesystem hierarchy standard (FHS)
The component of the Linux OS that organizes data
Filtering
Selecting dated that match a certain condition
Final report
Documentation that provides a comprehensive review of an incident
Firewall
A network security device that monitors traffic to or from a Network
Float data
Data consisting of a number with a decimal point
Foreign key
A column in a table that is a primary key in another table
Forward proxy server
A server that regulates and restricts a persons access to the Internet
Function
A section of code that can be reused in a program
Graphical user interface (GUI)
A user interface that uses icons on the screen to manage different tasks on the computer
Global variable
A Variable that is available through the entire program
Hacker
Any person or group who uses computers to gain unauthorized access to data
Hacktivist
A person who uses hacking to achieve a political goal
Hard drive
A hardware component used for long-term memory
Hardware
The physical components of a computer
Hash collision
An instant when different inputs produce the same hash value
Hash function
An algorithm that produces a code that can’t be decrypted
Hash table
A data structure that used to store and reference hash values
Health insurance portability and accountability act (HIPAA)
A US federal law established to protect patients health information
Honeypot
A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders
Host-based intrusion detection system (HIDS)
An application that monitors the activity of the host on which it’s installed
Hub
A network device that broadcast information to every device on the network
Hypertext transfer protocol (HTTP)
An application layer protocol that provides a method of communication between clients and website servers
Hypertext transfer protocol secure (HTTPS)
A network protocol that provides a secure method of communication between clients and website servers
Identify
A NIST core function related to management of cyber security risk and it’s affect on an organizations people and assets
Identity and access management (IAM)
A collection of processes and technologies that helps organizations manage digital identities of their environment
IEEE 802.11 (WiFi)
Set of standards that define communication for wireless LANs
Immutable
An object that cannot be changed after it is created and assigned a value
Implement
The fourth step of the NIST RMF that means to implement security and privacy plans for an organization
Improper usage
An incident type that occurs when an employee of an organization violates the organizations acceptable use policies
Incident
An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity or availability of information or an information system; or constitutes a violation of imminent threat of violation of law, security policies, security procedures, or acceptable use policies
Incident escalation
The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member
Incident handler’s journal
A form of documentation used in incident response
Incident response
An organizations quick attempt to identify an attack, contain the damage, and correct the effects of a security breach