๐Ÿšจ Limited Offer: First 50 users get 500 credits for free โ€” only ... spots left!
Cybersecurity Flashcards

Free Cybersecurity flashcards, exportable to Notion

Learn faster with 50 Cybersecurity flashcards. One-click export to Notion.

Learn fast, memorize everything, master Cybersecurity. No credit card required.

Want to create flashcards from your own textbooks and notes?

Let AI create automatically flashcards from your own textbooks and notes. Upload your PDF, select the pages you want to memorize fast, and let AI do the rest. One-click export to Notion.

Create Flashcards from my PDFs

Cybersecurity

50 flashcards

Encryption is the process of encoding data in such a way that only authorized parties can access it, using an encryption key or algorithm.
Symmetric encryption uses a single secret key for both encrypting and decrypting data. Examples include AES and DES.
Asymmetric encryption uses two different keys - a public key for encryption and a private key for decryption. An example is RSA.
A cryptographic hash function is a one-way mathematical function that converts data of any size into a fixed-size hash value in a way that is extremely difficult to reverse.
Network security refers to protecting a computer network and its services from unauthorized access, misuse, modification, destruction or improper disclosure.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A Virtual Private Network (VPN) extends a private network across a public network, enabling users to securely access resources as if they were directly connected to the private network.
The CIA triad refers to the three core principles of cybersecurity: Confidentiality, Integrity, and Availability of data and systems.
Risk assessment is the process of identifying, analyzing, and evaluating risks to organizational operations and data assets, in order to determine appropriate risk response measures.
A vulnerability is a weakness or flaw in a system, network, or application that could be exploited by a threat actor to gain unauthorized access or disrupt operations.
Social engineering refers to manipulating people into revealing sensitive information or performing actions that compromise security, often through psychological manipulation.
Malware (malicious software) refers to any program or code designed to cause damage, disrupt operations, or gain unauthorized access to systems.
A Distributed Denial of Service (DDoS) attack is an attempt to make a server, service or network resource unavailable to users by overwhelming it with traffic from multiple sources.
Penetration testing (pen testing) is the practice of testing a computer system or network to find vulnerabilities that an attacker could exploit, in order to strengthen security.
Security by design is an approach that considers security as a core requirement and integrates security measures throughout the entire software/system development life cycle.
Ransomware is a type of malware that encrypts a victim's files and demands a ransom payment to restore access to the data.
Phishing is a type of social engineering attack that uses fraudulent emails, texts or websites to trick users into revealing sensitive information or installing malware.
Two-factor authentication (2FA) is a security process that requires two different forms of authentication from a user to verify their identity, such as a password and a one-time code.
The principle of least privilege is the practice of restricting user or system access rights to only what is required for legitimate purposes, reducing risk of misuse or compromise.
Data encryption at rest refers to the process of encoding data stored on a device or in cloud storage, protecting it from unauthorized access even if the storage medium is lost or stolen.
A demilitarized zone (DMZ) network is a physical or logical subnet that separates an organization's internal network from an untrusted external network, such as the internet.
SQL injection is a technique used to attack data-driven applications by inserting malicious SQL statements into application input fields, allowing unauthorized database access.
Defense in depth is a cybersecurity strategy that uses multiple layered security controls to protect against threats at different levels, reducing the risk of a single point of failure.
Incident response refers to the process and procedures an organization follows to detect, analyze, and respond to cybersecurity incidents or data breaches.
Multifactor authentication (MFA) is a security process that requires multiple forms of authentication from users to verify their identity, such as a password, biometric data, and a security token.
Application security refers to the measures, tools and practices used to prevent gaps or vulnerabilities in applications and APIs that could be exploited by attackers.
Data loss prevention (DLP) refers to systems and practices that detect and prevent unauthorized transfer or leakage of sensitive data outside of an organization's network.
Security information and event management (SIEM) is a system that aggregates and analyzes activity from many different sources across the entire IT infrastructure to detect security threats.
A digital certificate is an electronic document or data file that binds identifying information about an individual or organization to a public encryption key, enabling secure authentication.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes communication functions of a network into seven abstraction layers.
IP spoofing is a technique used to gain unauthorized access to systems by masking the identity of the sender by forging source IP address information in network packets.
A honeypot is a cybersecurity resource that is designed to look valuable and attractive to attackers, while in reality it is isolated and monitored to detect and study malicious activity.
Vulnerability scanning is the process of identifying and classifying potential vulnerabilities in computer systems, software, networks, or cloud services that could be exploited.
Web application security refers to the measures and practices employed to protect web applications from threats like injection attacks, cross-site scripting, broken authentication and session management.
NIST (National Institute of Standards and Technology) is a U.S. federal agency responsible for developing standards and guidelines for cybersecurity, cryptography, and more.
The principle of separation of duties is a security concept that requires dividing critical tasks or privileges across multiple users, roles or systems, to reduce insider threats.
Exploit code refers to software programs or scripts designed to take advantage of security vulnerabilities in systems, applications, or services to gain unauthorized access or cause system failure.
A computer worm is a type of malicious software or malware that self-replicates across computer networks without user intervention by exploiting security vulnerabilities.
PKI (Public Key Infrastructure) is a framework for creating, managing, distributing, using and revoking digital certificates to enable authentication and encryption across networks.
Data masking is a technique used to protect sensitive data by making it unreadable or replacing it with fictitious but realistic values, enabling activities such as testing while preserving security.
Security orchestration refers to the integration of security tools and processes through automated workflows, enabling centralized visibility and coordinated incident response across the security infrastructure.
The zero trust security model assumes that all users, devices and systems, whether inside or outside the network perimeter, are potential threats and must be continuously verified and authorized.
Ethical hacking, also called penetration testing, is the practice of legally attempting to breach an organization's defenses to identify potential vulnerabilities before malicious hackers do.
The OWASP Top 10 is a regularly updated report that highlights the ten most critical web application security risks, helping organizations prioritize remediation efforts.
Security hardening is the process of reducing system vulnerabilities by applying a set of standards, best practices and configurations to lock down and secure systems against threats.
Common cybersecurity frameworks include NIST CSF, ISO 27001, CIS Controls, COBIT and PCI DSS, which provide guidelines and best practices for managing cybersecurity risk.
Threat modeling is a structured process for identifying, analyzing and mitigating potential threats to systems, data, applications and other assets by enumerating entry points, vulnerabilities and possible attacks.
A security operations center (SOC) is a centralized team responsible for monitoring, detecting, investigating and responding to cybersecurity incidents across an organization.
Security automation refers to the use of technology solutions to automatically handle security tasks and processes, increasing efficiency, consistency and reducing the potential for human error.
Biometrics refers to the use of unique physical or behavioral characteristics, such as fingerprints, facial features or iris patterns, to authenticate identities and control access.