terminology Flashcards
Access controls
Rules and techniques used to manage and restrict entry to or exit from a physical,
virtual or digital area through the use of permissions
Advanced persistent threats
A set of tactics used by hackers to infiltrate networks and then leave
malicious software in place for as long as possible
Anchoring heuristic
The human tendency to accept and rely on, the first piece of information
received before making a decision. That first piece of information is the anchor and sets the tone for
everything that follows
Anti-malware / anti-virus
Computer program that is designed to look for specific
behaviours/signatures that indicate the presence of malicious software
Availability heuristic
= A mental shortcut that relies on immediate examples that come to a given
person’s mind when evaluating a specific topic, concept, method or decision
Backdoor
= A covert method of accessing software or a device that bypasses normal authentication
requirements
Barnum effect (heuristic)
The phenomenon that occurs when individuals believe that personality
descriptions apply specifically to them (more so than to other people), despite the fact that the
description is actually filled with information that applies to everyone. They are vague and general
statements
Bias
A strong inclination of the mind or a preconceived opinion about something or someone
Black hat
A hacker with unethical or illegal objectives
Botnet
= A connected set of programs designed to operate together over a network. Usually a
network of private computers infected with malicious software and controlled as a group without
the owners’ knowledge
Brutal force attack
= A systematic approach to quickly generate large amounts of passwords to gain
unauthorised access to a system
Change blindness (heuristic)
A perceptual phenomenon that occurs when a change in a visual
stimulus is introduced and the observer does not notice it (e.g., turning a picture off and back on and
not noticing that the person in the corner wasn’t there before)
Cipher
The use of a key to change information into a secret or hidden format
Cognitive dissonance (bias)
The discomfort experienced when two cognitions are incompatible
with each other (a cognition is a piece of knowledge, such as a: thought, attitude or personal value)
Confirmation bias
Seeking to confirm your existing beliefs
Search bias
Only searching for information that adds to what you already believe
Truth bias
Automatically assuming people are telling the truth (to make life easier)
Conformity (bias)
Going with the flow of the majority (for example due to social pressure or being
unwilling to have a leading role)
Burst the ‘bubble’
Stepping out of the group think, which may lead to others stepping out
too
Cryptoanalysis
Examining ciphered info to determine how to circumvent the technique used to
enforce or hide
Cryptocurrency
A digital currency that makes use of encryption to generate and secure confidence
in the units that are traded
CSMA/CD=
Carrier-sense multiple access with collision detection. (Imagine that everyone in a Teams
call would randomly start saying stuff unmuted. What CSMA/CD does is like making sure those
packets don’t collide with each other)
Cyber security=
The protection of digital devices, data, networks and systems to keep them stable,
dependable and reasonably safe from danger or threat (intentional exploits / cyber attacks)
Cyberspace
Cyberspace is composed of all the computerized networks in the world, as well as of all computerized end points (including telecommunications networks, special purpose networks, the internet, computer systems, and computer-based systems). The concept also includes the information stored, processed, and transmitted on the devices and between these networks
Dark Web
Websites that hide their server locations. The hidden server values make it difficult to
determine who are what are behind these sites