Vocab Drill Flashcards

Study

1
Q

App

A

Software that allows you to do specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Commuter

A

Someone who travels to work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of apps

A

Tasks and activities like web browser, picture viewers, games.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applications

A

A type of software that allows a user to perform specific tasks and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Utilities

A

Applications designed to help analyze, configure, optimize, or maintain a computer. Unlike application software (which focuses on benefiting the user), utilities are used to support the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating System (OS)

A

Software that manages the computer hardware and software. It’s a system that sits between the applications and hardware. MS Windows is an example of an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Platform

A

The environment in which a piece of software is executed. It may be the hardware, operating system, a web browser, or other underlying software. F.e. MS Windows is a platform for MS Word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Platform 2

A

Platform: Mac Computer. Game: software running on the Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Feature

A

A distinctive characteristic of software or hardware. FE facial recognition is a feature of the Iphone X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Plugin

A

component that adds a specific feature to software. also referred to as an extension. FE you can add a plugin to your web browser that allows you to change the theme colors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SaaS

A

Software licensed on a subscription basis. The software is stored centrally on a server. Itś sometimes referred to as ‘on demand’ software FE Google Apps are SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API (Application program interface)

A

A set of clearly defined methods of communication between software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Console

A

User interface that manages and controls software and/or hardware. KB4 customers access our products through a console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dashboard

A

At-a-glance views of key info, relevant to a particular goal or business objective. The’re often displayed as charts and/of other geographical images on a web page. KB4 dashboards to display sales on monitors placed around the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Server

A

Computer or program that manages access to centralized resources. FE a file server would store and manage all the user files for a group of computers and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain

A

Short for ‘domain name’, a unique name that identifies a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Directory

A

1 like physical folders, a directory organizaes files or data on a hard drive or in a program. Directories can contain other directories, which are then called sub-directories.
2 Software that stores all resources on a netwerk. FE users, groups, permissions, devices and management policies. A directory is also called a directory service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AD Active Directory

A

A directory service developed by MS for use on MS OS’s. If you were in charge of all the users and computers on a network that are using a MS server, you would use AD to set up users, their passwords and what devices they could access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Protocol

A

A specific set of communication rules between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP (Hypertext Transfer Protocol)

A

One of the protocols used to transfer information (like a webpage) over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS (Hypertext Transfer Protocol Secure)

A

The same as HTTP but secure. This protocol secures the data by changing it to special code that requires special translation. If you were inputting credit card data on a website, you would want that data to transmit securely, using HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

White Paper

A

A report that describes how a technology of product solves a problem. It’s a marketing and technical document that doesn’t go too far in either direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Whitelist

A

A list of trusted email adresses, domains and/or internet adressed that are permitted to pass through a system or filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Phishing is…

A

the process of attempting to acquire sensitive information such as usernames, passwords, and credit card details. It’s done by masquerading as a trustworthy entity on bulk email , which tries to evade spam filters. Emails claiming to be from popular social websites, bank, auction sites, or IT administrators are commonly used to lure the unsuspecting public. It’s a form of criminally fraudulent social engineering.

25
Q

Spear phishing

A

A small, focused, targeted phishing attack on a specific person of organization, with the goal to penetrate their defenses. The attack is done after research has been done on the target, and has a specific personalized component designed to make the target do something against his or her own interest.

26
Q

Phishing attack surface

A

The quantity of emails exposed on the internet. The more email addresses exposed, the bigger the attack footprint is and the higher the risk for phishing attacks

27
Q

Phish-prone Precentage

A

A term coined by KB4 that indicates the percentage of employees that are prone to click on phishing links. (The customer starts with a baseline ((a starting point used for comparison)) percentage, which is the percentage of users who click on phishing links before being trained. Once trained, the test is done again 12 months later, to see the improvement.

28
Q

Social engineering

A

The act of manipulating people into performing actions or divulging confidential information. The term typically applies to trickery of deception for the purpose of information gathering, fraud, computer system access.

29
Q

CEO Fraud

A

A spear phishing attack that targets high-risk users -people in Accounting, HR, of executive assistants- in which the hacker claims to be the CEO (of another executive) and urges an employee to do something that would not be authorized by the legitimate sender.

30
Q

Vishing (voice phishing)

A

A phising attack conducted by phone. Is the phone equivalent of a phishing attack. 2 forms of this: human and automated. Scam artist pretends to be a representative.

31
Q

Smishing

A

Phishing conducted via Short Message Service (SMS), a telephone-based test messaging service.

32
Q

Email spoofing

A

Spoofing (tricking or deceiving) computer systems or ther computer users. Involves sending messages from a bogus email address of faking the email address of another user. Spoofing is a common tactic in CEO Fraud attacks.

33
Q

Botnet

A

Short for ‘robot network’, it is a collection of software robots of ‘bots’ that live on infected computers and are controlled by bad guys. Botnets do many bad things like spew out spam, attack other computers, or send back confidential data to the botnet controller.

34
Q

Keylogger

A

Malware of hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.

35
Q

Bitcoin

A

Digital currency in which encryption (the process of converting information or data into a code) techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.

36
Q

Money mule

A

person recruited by a criminal of criminal organization to quickly receive and turnaround funds involved in scams. The person is often unaware of their role in the criminal act.

37
Q

Trojan

A

Malicious software that seems to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system. Example: email with news that installs software to slow the computer down and any other computers it connects with.

38
Q

Worm

A

A self-replicating computer program. it sends copies of itself to other computers, and may do so without any user intervention. Unlike a virus, it doesn’t need to attach itself to an existing file. Worms almost always cause at least some harm to the network. FE email love letter when opened changes files on a computer and sends itself to all email adresses in user’s contact list.

39
Q

Virus

A

Malicious computer program that infects a file. The wordk is incorrectly used as an umbrella term for many flavors of viruses, worms and trojans. Can only spread when its host is sent to the target computer.

40
Q

Malware

A

Short for malicious software. an umbrella term for various types of viruses, worms and trojans.

41
Q

Ransomware

A

Vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Also known as cryptoware.

42
Q

Rootkit

A

Malicious code that loads into the early loading stages of a computer. The codes hides itself from the OS and other applications that load in the later stages, like antivirus and system utilities. Giving full access to alter the system.

43
Q

Data breach

A

Intentional or unintentional release of secure information to an untrusted environment. Information disclosure, data leak, data spill.

44
Q

DoS attack

A

Denial-of-service attack: attackers seek to make a computer or network unavailable to its intended user(s) by temporarily or indefinitely disrupting service. Done by flooding the system with service requests. When it comes from multiple sources, it is called DDoS (distributed denial-of-service). Analogy”people crowding the entryway of store making it hard to enter.

45
Q

Security vulnerability

A

Weakness on a network, computer, or software which allows the bad guys to gain access. It has 3 elements: a flaw, access to the flaw, capability to exploit that flaw. FE computer with outdated security updates, so you can easily bypass the plogin password.

46
Q

Exploit

A

Software or code -usually malicious- that takes advantage of a flaw or vulnerability. The purpose is to cause unintended or unanticipated behavior to occur with the software or hardware.

47
Q

Zero-day

A

The name of a vulnerabilty UNKNOWN to those who would be interested in securing it, which includes the software vendor or user (good guys). The BGs use these vulnerabilties to launch an attack. Why is it called this way? because it was discovered before the GGs could fix it. And the GGs had no warning (they had zero-days to do something about it.

48
Q

Zero-day exploit

A

AKA zero-day attack, an exploit that takes advantage of a zero-day vulnerability on its first day of release, before the vendor knows about it.

49
Q

Advanced persistent threat

A

AKA APT, is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The BGs goal is to go undetected and steal data, rather than cause damage to the netwrok or organization

50
Q

Tailgating

A

AKA piggybacking, tailgating is a method used by BGs to gain access to a building or other protected areas. To follow right behind after a authorized user opened and passed through a secure entry.

51
Q

Firewall

A

HW or SW designed to block unauthorized network access while permitting authorized communications.

52
Q

Cloud Computing

A

The practice of using remote servers in the Internet to store, manage, process data, rather than a local server or a pc. Cloud servers get all the latest software and securiy updates, making them less vulnarable to attack

53
Q

Security awareness training (SAT)

A

Any training that raises the awareness of a user to potential threats and how to avoid them. Goal is to get users to make smarter security decisions and help theri organization manage the ongoing problem of social engineering. User = last line of defense by the BGs.

54
Q

Kevin Mitnick

A

Mid-ninties the worlds most wanted hacker. Today the Worlds most famous hacker. A very succesfull Fortune 500 security consultant. part owner and CHO of KB4. Based on his 30 year+ first-hand experience for KMSAT. His experience.

55
Q

LMS

A

System for administraing, documentation, tracking, reporting and delivery of e-learning education courses or training programs = Bridge.

56
Q

ROI

A

Measusres the amount of return of an investment relative to the investorś cost. In IT SEC ROI is ‘reduction of risk’ not as a concrete financial gain. Without proper security awarenes training a company can experience a loss of reputation, productivity, and revenue.

57
Q

Risk for a company

A

Without proper security awarenes training a company can experience a loss of reputation, productivity, and revenue.

58
Q

Shareable Content Object Reference Model (SCORM)

A

Technical standard that governs how online content and LMS communicate with each other. Our customer access our security training thourgh an LMS. those modules are following the SCORM standard.