Glossary_Foundations in Cybersecurity_C1 Flashcards

1
Q

Adversarial artificial intelligence.
What is it?

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software:

A

A software program used to prevent, detect, and eliminate malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset:

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Email Compromise (BEC):

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud security:

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compliance:

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer virus:

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality, means?

A

Only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA triad: What is it and what are the 3 components?

A

Confidentiality, integrity, availability
A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptographic attack:

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity (or security):

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Database:

A

An organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data point:

A

A specific piece of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hacker:

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacktivist:

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HIPAA

A

Health Insurance Portability and Accountability Act
A U.S. federal law established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Integrity

A

The idea that the data is correct, authentic, and reliable.
One of the CIA Triad components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Internal threat:

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IDS

A

Intrusion Detection System
An application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Linux:

A

An open-source operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Malware:

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NIST stand for?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NIST (CSF):

A

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF):
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

24
Q

Network protocol analyser (packet sniffer):

A

A tool designed to capture and analyse data traffic within a network

25
Q

Network security is the practice of:

A

The practice of keeping an organisation’s network infrastructure secure from unauthorized access

26
Q

OWASP

A

Open Web Application Security Project
A non-profit organization focused on improving software security

27
Q

Password attack:

A

An attempt to access password secured devices, systems, networks, or data

28
Q

PII

A

Personally identifiable information
Any information used to infer an individual’s identity

29
Q

Order of volatility:

A

A sequence outlining the order of data that must be preserved from first to last

30
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

31
Q

Physical attack:

A

A security incident that affects not only digital but also physical environments where the incident is deployed

32
Q

Physical social engineering:

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

33
Q

Privacy protection:

A

The act of safeguarding personal information from unauthorized use

34
Q

Programming:

A

A process that can be used to create a specific set of instructions for a computer to execute tasks

35
Q

PHI: Protected health information

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

36
Q

Protecting and preserving evidence:

A

The process of properly working with fragile and volatile digital evidence

37
Q

Security architecture:

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

38
Q

Security controls:

A

Safeguards designed to reduce specific security risks

39
Q

Security ethics:

A

Guidelines for making appropriate decisions as a security professional

40
Q

Security frameworks:

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

41
Q

Security governance:

A

Practices that help support, define, and direct security efforts of an organization

42
Q

SIEM

A

Security information and event management
An application that collects and analyzes log data to monitor critical activities in an organization

43
Q

Security posture:

A

An organization’s ability to manage its defence of critical assets and data and react to change

44
Q

SPII

A

Sensitive personally identifiable information
A specific type of PII that falls under stricter handling guidelines

45
Q

Social engineering:

A

A manipulation technique that exploits human error to gain private information, access, or valuables

46
Q

Social media phishing:

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

47
Q

Spear phishing:

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

48
Q

SQL (pronounced sequel)

A

(Structured Query Language): A programming language used to create, interact with, and request information from a database

49
Q

Supply-chain attack:

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

50
Q

Threat:

A

Any circumstance or event that can negatively impact assets

51
Q

Threat actor:

A

Any person or group who presents a security risk

52
Q

USB baiting:

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

53
Q

Virus:

A

Malicious code written to interfere with computer operations and cause damage to data and software

54
Q

Vishing:

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

55
Q

Watering hole attack:

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users