Keywords from Luke Flashcards

1
Q

CIA Triad

A

A security model focusing on Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical Hacker

A

An individual who exploits systems legally and ethically to find vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Security Researcher

A

Professionals studying digital threats and security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls

A

Security measures to mitigate risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internetworked Information Systems

A

Integrated systems that share data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLA

A

Three-Letter Acronym, typically referring to security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Persistent Threats (APT)

A

Long-term targeted cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 Eyes

A

An intelligence alliance comprising five Anglophone countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Google Dork

A

A search string for finding specific data using Google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operation Aurora

A

Google’s cybersecurity incident in 2009.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IR - Incident Responder

A

A professional dealing with cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Playbook

A

A strategic outline for cybersecurity operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ACSC & JCSC

A

Australian Cyber Security Centre and Joint Cyber Security Centres respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero Trust

A

Security model that does not inherently trust any entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control

A

Mechanisms that enforce policy within systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attribution

A

Identifying the origin of a cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sec Ops

A

Security Operations, often involved in maintaining day-to-day security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Signal Intelligence (SigInt)

A

Collection and analysis of electronic signals and communications by other nations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

0-day

A

A software vulnerability that is unknown to those who should be interested in its mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

C2 Servers (C & C)

A

Command and Control servers used by attackers to maintain communications with compromised systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hack Back

A

Act of hacking against an entity that has attacked you first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Systems of National Significance

A

Important infrastructures whose compromise can affect national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ransomware

A

Malware that encrypts files and demands payment for their release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Exfiltrate Data

A

Unauthorized copying, transfer or retrieval of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Confidentiality, Integrity, Availability (CIA Triad):

A

Three fundamental principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DOS/DDOS Attacks

A

Denial of Service and Distributed Denial of Service attacks to make a machine or network resource unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Elastic Computing

A

The ability to acquire computing resources on demand and to scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

TCP, UDP, SSL/TLS

A

Protocols for transmitting data over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Personally Identifiable Information (PII)

A

Information that can be used to identify an individual.

30
Q

NZISM

A

New Zealand Information Security Manual.

31
Q

Hikvision / EUFY / Wyze

A

Brands associated with security surveillance technologies.

32
Q

Control

A

Any measure used to help implement a security measure.

33
Q

Scope

A

The extent to which cybersecurity measures are applied.

34
Q

Cyber Extortion:

A

The act of demanding money by threatening to expose confidential information.

35
Q

CellerBrite

A

A data extraction solution commonly used by law enforcement.

36
Q

Patch Tuesday

A

The day Microsoft releases security patches.

37
Q

Hide My Email

A

A feature that helps in protecting email privacy.

38
Q

Confidentiality, Identification, Authentication, Authorization, and Accountability (IAAA)

A

Components essential for secure transactions.

39
Q

User/Service Accounts

A

Accounts that have specific roles and privileges.

40
Q

Insider Threat

A

Risks posed by individuals within the organization.

41
Q

Defence in Depth

A

Layered security measures

42
Q

Software Vulnerabilities and Misconfigurations

A

Weaknesses and incorrect settings in software.

43
Q

AWS S3 Buckets

A

Cloud storage resources on Amazon Web Services.

44
Q

API

A

Application Programming Interface for software interactions.

45
Q

DLP

A

Data Loss Prevention, techniques to prevent unauthorized data access.

46
Q

Deprecated

A

Marked for obsolescence.

47
Q

Public/Private Keys, Plaintext, Ciphertext, Cipher, Brute Force

A

Elements and techniques in cryptography.

48
Q

Confusing, Diffusion

A

Methods to complicate deciphering.

49
Q

Security Through Obscurity, Information Wants to be Free

A

Philosophical stances in cybersecurity.

50
Q

Glasswire

A

A network monitoring tool.

51
Q

Random Numbers, Salts

A

Elements for cryptographic randomness

52
Q

Symmetric and Asymmetric Encryption

A

Two main categories of encryption based on key usage.

53
Q

Integer

A

A type of data that represents whole numbers.

54
Q

ECC

A

Elliptic Curve Cryptography, a type of public-key cryptography.

55
Q

Polymorphic Viruses

A

Viruses that can alter their code to evade traditional security measures.

56
Q

Hugging Face

A

An AI research organization specializing in natural language processing

57
Q

Kevin Mitnick

A

A renowned hacker-turned-security consultant.

58
Q

KnowB4

A

A platform for security awareness training.

59
Q

Script Kiddie

A

A pejorative term for individuals with limited understanding who use pre-written hacking tools.

60
Q

Hashing

A

The process of converting data into a fixed-size string of characters.

61
Q

MD5 Hashing

A

An older, commonly used hashing algorithm.

62
Q

Avalanche Effect

A

A desirable property of cryptographic algorithms where a small change in input significantly changes the output.

63
Q

SHA-2

A

A family of cryptographic hash functions.

64
Q

Base64

A

An encoding scheme that converts binary data to ASCII string format.

65
Q

Algorithm

A

A procedure for solving computational problems.

66
Q

AES, DES, IDEA, Blowfish, RC4, RC5, RC6

A

Types of encryption algorithms.

67
Q

Data at rest/in use

A

States of data storage during lifecycle.

68
Q

Man in the Middle

A

A form of eavesdropping attack.

69
Q

PCI DSS

A

Security standards for all organizations that handle credit card information.

70
Q

NIST SP-800-39

A

A comprehensive guide for federal agencies to manage information security risk.