terminology Flashcards

1
Q

Access controls

A

Rules and techniques used to manage and restrict entry to or exit from a physical,
virtual or digital area through the use of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advanced persistent threats

A

A set of tactics used by hackers to infiltrate networks and then leave
malicious software in place for as long as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anchoring heuristic

A

The human tendency to accept and rely on, the first piece of information
received before making a decision. That first piece of information is the anchor and sets the tone for
everything that follows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-malware / anti-virus

A

Computer program that is designed to look for specific
behaviours/signatures that indicate the presence of malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability heuristic

A

= A mental shortcut that relies on immediate examples that come to a given
person’s mind when evaluating a specific topic, concept, method or decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backdoor

A

= A covert method of accessing software or a device that bypasses normal authentication
requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Barnum effect (heuristic)

A

The phenomenon that occurs when individuals believe that personality
descriptions apply specifically to them (more so than to other people), despite the fact that the
description is actually filled with information that applies to everyone. They are vague and general
statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bias

A

A strong inclination of the mind or a preconceived opinion about something or someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Black hat

A

A hacker with unethical or illegal objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

= A connected set of programs designed to operate together over a network. Usually a
network of private computers infected with malicious software and controlled as a group without
the owners’ knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brutal force attack

A

= A systematic approach to quickly generate large amounts of passwords to gain
unauthorised access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Change blindness (heuristic)

A

A perceptual phenomenon that occurs when a change in a visual
stimulus is introduced and the observer does not notice it (e.g., turning a picture off and back on and
not noticing that the person in the corner wasn’t there before)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cipher

A

The use of a key to change information into a secret or hidden format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cognitive dissonance (bias)

A

The discomfort experienced when two cognitions are incompatible
with each other (a cognition is a piece of knowledge, such as a: thought, attitude or personal value)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Confirmation bias

A

Seeking to confirm your existing beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Search bias

A

Only searching for information that adds to what you already believe

17
Q

Truth bias

A

Automatically assuming people are telling the truth (to make life easier)

18
Q

Conformity (bias)

A

Going with the flow of the majority (for example due to social pressure or being
unwilling to have a leading role)

19
Q

Burst the ‘bubble’

A

Stepping out of the group think, which may lead to others stepping out
too

20
Q

Cryptoanalysis

A

Examining ciphered info to determine how to circumvent the technique used to
enforce or hide

21
Q

Cryptocurrency

A

A digital currency that makes use of encryption to generate and secure confidence
in the units that are traded

22
Q

CSMA/CD=

A

Carrier-sense multiple access with collision detection. (Imagine that everyone in a Teams
call would randomly start saying stuff unmuted. What CSMA/CD does is like making sure those
packets don’t collide with each other)

23
Q

Cyber security=

A

The protection of digital devices, data, networks and systems to keep them stable,
dependable and reasonably safe from danger or threat (intentional exploits / cyber attacks)

24
Q

Cyberspace

A

Cyberspace is composed of all the computerized networks in the world, as well as of all computerized end points (including telecommunications networks, special purpose networks, the internet, computer systems, and computer-based systems). The concept also includes the information stored, processed, and transmitted on the devices and between these networks

25
Q

Dark Web

A

Websites that hide their server locations. The hidden server values make it difficult to
determine who are what are behind these sites

26
Q
A