Terms Flashcards

1
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sensitive personally identifiable information (SPII

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance

A

Compliance is the process of adhering to internal standards and external regulations. It enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

A software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonates a known source to obtain a financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social media phishing

A

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

16
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

17
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

18
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

19
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

20
Q

Password attack

A

An attempt to access password-secured devices, systems, networks, or data

21
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

22
Q

Security frameworks

A

Guidelines that are used for building plans to help mitigate risks and threats to data and privacy

23
Q

security controls

A

They are safeguards designed to reduce specific security risks

24
Q

Privacy protection

A

means safeguarding personal information from unauthorized use

25
Q

Laws

A

rules that are recognized by a community and enforced by a governing entity.

26
Q

National Institute of Standards and Technology (NIST) Cyber Security Framework
(CSF)

A

A voluntary framework that consists of standards, guidelines, and best
practices to manage cybersecurity risk

27
Q

Security information and event management (SIEM)

A

An application that collects
and analyzes log data to monitor critical activities in an organization