Terms A Flashcards
Absolute file path
The full file path, which starts from the root
Access controls
Security controls that manage access, authorization, and
accountability of information
Active packet sniffing
A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP)
A network protocol used to determine the MAC
address of the next router or device on the path
Advanced persistent threat (APT)
An instance when a threat actor maintains
unauthorized access to a system for an extended period of time
Adversarial artificial intelligence (AI):
A technique that manipulates artificial
intelligence (AI) and machine learning (ML) technology to conduct attacks more
efficiently
Adware
A type of legitimate software that is sometimes used to display digital
advertisements in applications
Algorithm
A set of rules used to solve a problem
Analysis
The investigation and validation of alerts
Angler phishing
A technique where attackers impersonate customer service
representatives on social media
Anomaly-based analysis
A detection method that identifies abnormal behavior
Antivirus software
A software program used to prevent, detect, and eliminate
malware and viruses
Application
A program that performs a specific task
Application programming interface (API) token
A small block of encrypted code
that contains information about a user
Argument (Linux)
Specific information needed by a command
Argument (Python)
The data brought into a function when it is called
Array
A data type that stores data in a comma-separated ordered list
Assess
The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly
Asset
An item perceived as having value to an organization
Asset classification
The practice of labeling assets based on sensitivity and
importance to an organization
Asset inventory
A catalog of assets that need to be protected
Asset management
The process of tracking assets and the risks that affect them
Asymmetric encryption
The use of a public and private key pair for encryption and
decryption of data
Attack surface
All the potential vulnerabilities that a threat actor could exploit
Attack tree
A diagram that maps threats to assets
Attack vectors
The pathways attackers use to penetrate security defenses
Authentication
The process of verifying who someone is
Authorization
The concept of granting access to specific resources in a system
Authorize
The sixth step of the NIST RMF that refers to being accountable for the
security and privacy risks that might exist in an organization
Automation
The use of technology to reduce human and manual effort to perform
common and repetitive tasks
Availability
The idea that data is accessible to those who are authorized to access it