Glossary_Foundations in Cybersecurity_C1 Flashcards
Adversarial artificial intelligence.
What is it?
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Antivirus software:
A software program used to prevent, detect, and eliminate malware and viruses
Asset:
An item perceived as having value to an organization
Business Email Compromise (BEC):
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
Cloud security:
The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Compliance:
The process of adhering to internal standards and external regulations
Computer virus:
Malicious code written to interfere with computer operations and cause damage to data and software
Confidentiality, means?
Only authorized users can access specific assets or data
CIA triad: What is it and what are the 3 components?
Confidentiality, integrity, availability
A model that helps inform how organizations consider risk when setting up systems and security policies
Cryptographic attack:
An attack that affects secure forms of communication between a sender and intended recipient
Cybersecurity (or security):
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Database:
An organized collection of information or data
Data point:
A specific piece of information
Hacker:
Any person who uses computers to gain access to computer systems, networks, or data
Hacktivist:
A person who uses hacking to achieve a political goal
HIPAA
Health Insurance Portability and Accountability Act
A U.S. federal law established to protect patients’ health information
Integrity
The idea that the data is correct, authentic, and reliable.
One of the CIA Triad components
Internal threat:
A current or former employee, external vendor, or trusted partner who poses a security risk
IDS
Intrusion Detection System
An application that monitors system activity and alerts on possible intrusions
Linux:
An open-source operating system
Malware:
Software designed to harm devices or networks
What does NIST stand for?
National Institute of Standards and Technology