Cybersecurity Concepts: A Beginner's Set
Computer Science

Cybersecurity Concepts: A Beginner's Set

26

Terms

0

Plays

0

Favorites
Shares
Description

This study set covers fundamental cybersecurity concepts. Topics include network security, data protection, threat modeling, and incident response.

Top Scores
Show Less
ghost_fill
No players yet
Be the first one to play!
Cards
Show Less
Cybersecurity

The practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction.

Threat

Any potential danger that could exploit a vulnerability to breach security and negatively impact an organization or individual.

Vulnerability

A weakness in a system's design, implementation, operation, or internal controls that could be exploited by a threat.

Risk

The likelihood that a threat will exploit a vulnerability resulting in a negative impact.

Risk Assessment

The process of identifying, analyzing, and prioritizing vulnerabilities and threats to determine the overall risk to an organization.

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Intrusion Detection System IDS

A system that monitors network traffic for malicious activity and generates alerts when suspicious behavior is detected.

Intrusion Prevention System IPS

A system that monitors network traffic for malicious activity and actively blocks or prevents suspicious behavior.

Anti-virus Software

Software designed to detect, prevent, and remove malicious software (malware) from computer systems.

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, Trojans, ransomware, spyware.

Phishing

A social engineering attack where attackers attempt to trick users into revealing sensitive information such as usernames, passwords, and credit card details.

Social Engineering

The art of manipulating individuals into divulging confidential information or performing actions that compromise security.

Denial-of-Service DoS Attack

An attack that floods a network or system with traffic, making it unavailable to legitimate users.

Distributed Denial-of-Service DDoS Attack

A DoS attack launched from multiple sources, making it more difficult to mitigate.

Encryption

The process of converting readable data into an unreadable format to protect it from unauthorized access.

Digital Certificate

An electronic document that verifies the identity of a website or individual.

Public Key Infrastructure PKI

A system for creating, managing, distributing, using, storing, and revoking digital certificates and managing public-key cryptography.

Authentication

The process of verifying the identity of a user or device.

Authorization

The process of determining what a user or device is allowed to access.

Multi-Factor Authentication MFA

A security system that requires more than one method of authentication to verify a user's identity.

Virtual Private Network VPN

A secure connection over a public network, such as the internet.

Security Information and Event Management SIEM system

A system that collects and analyzes security logs from various sources to detect and respond to security threats.

Security Operations Center SOC

A centralized team responsible for monitoring and responding to security threats.

Patch Management

The process of regularly updating software and systems with security patches to fix vulnerabilities.

Data Loss Prevention DLP

A set of technologies and processes designed to prevent sensitive data from leaving the organization's control.

Zero Trust Security Model

A security model that assumes no implicit trust and requires verification for every user and device, regardless of location.