Week 1 Introduction Flashcards
National institute of standards and Technology NIST
A us govt agency that provides technology focused guidelines. They specify which security measures should be in place to ensure data safety.
Nice Framework
A national resource that assists employers in enhancing their cybersecurity workforce.
Port
A location from which network connections originate and terminate. OS handles these ports.
Terminal
A Linux text based interface that receives text-based commands as input and provides feed back in textual form.
Trojan Horse
A type of malware that disguises itself as a legitimate program and downloads onto a computer. Malicious code is concealed within legitimate software to gain access to the system.
Vulnerability
A device, software, or human weakness involving a cyber asset that an attacker can exploit to perform malicious activities.
Wanna Cry
A type of ransomware that emerged May 12, 2017. It was a massive attack campaign that affected companies worldwide.
Availability
All measures taken to ensure data is available to authorized parties whenever needed.
CIA triad
A model intended to manage information security policies inside an organization. 3 components are confidentiality, integrity, and availability.
Confidentiality
Measures taken to ensure sensitive data is not exposed to unauthorized parties.
Integrity
Measures that must be taken to ensure data cannot be changed by unauthorized parties.
Kali Linux
An open source distribution of the Linux operating system designed for advanced penetration testing purposes.