Lesson 2 – Cybersecurity Terminology
Term / Concept |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Description / Definition |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Match |
|
|
|
|
|
|
|
|
|
|
|
|
|
Missing numbers # 3, 4, 5, 14, 16,17,18
2FA (2-Factor Authentication) | Requires two pieces of evidence or credentials to gain access to an account or other secure/restricted area. |
APT (Advanced Persistent Threat) | A set of hacking processes targeting a specific entity –usually nations or organizations attacking for business or political motives. |
Breach | Internal data being made accessible to external entities without authorization. |
Cyberattack | An attacker executes malicious programs on a compromised system |
Data breach | An incident that results in the disclosure or exposure of data. |
Endpoint security | Protecting a corporate network from access by end users and remote devices. |
Hardening | Identifying and fixing vulnerabilities on a system. |
IDS (Intrusion Detection System) | A security system that gathers, analyzes and reports on possible security breaches in progress |
Least privilege | Assigning users the least amount of permissions necessary to perform their function. |
Malware | Any type of program used to perform malicious actions |
Patch management | An activity of researching, testing, approving and installing updates to computer systems. |
Penetration testing | An authorized, simulated attack exercise that evaluate the security of IT infrastructures. |
Proxy server | A server that intercepts client requests and forwards them to another server. |
Risk | The product of the level of threat with the level of vulnerability that indicates the likelihood of a successful attack. |
Security policy | Rules specifying or regulating how an organization’s security services to protect sensitive and critical resources. |
Social engineering | A cyber-attack to deceive victims into taking an action that places a victim at risk. |
Threat | The potential that a circumstance, capability, action, or event could breach security and cause harm. |
Threat vector | The method a threat uses to get to a target. |
Trusted network | The private network a firewall primarily protects. |
Vulnerability | A flaw that creates the opportunity for an unauthorized access and attack. |
Get Answers For Free
Most questions answered within 1 hours.