CYBER SECURITY AWARENESS
FLASHCARDS
EXAM PREPARATION GUIDE | 35 ITEMS
Q:Technology
The application of scientific knowledge for making improvements in productivity
Q:Detection
The act or process of discovering, finding, or noticing something.
Q:Virus
a program that is designed to harm a computer by deleting data, ruining files, and that can spread secretly from on computer to another.
Q:SSDLC
secure system development life cycle is a framework defining security requirements that must be considered and addressed within every system development project
Q:Worm
A usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Q:Password Cracking
refers to various measures used to discover computer passwords.
Q:Digital
Of, relating to, or using data in the form of numerical digits.
Q:Spyware
computer software that secretly records information about the way you use your computer
Q:Social Engineering
The act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information
Q:Cybersecurity
Measures were taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
Q:FIrewall
An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer.
Q:Phishing
A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers, which the scammers can use illicitly.
Q:Password
A secret series of numbers or letters that allows you to use a computer system.
Q:Pass phrase
A string of words and characters that you type in to authenticate yourself.
Q:Polices
A prescribed or proscribed course of action or behavior which is to be followed.
Q:Zombie
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
Q:Unpatched software
Software that hasn't had the latest security updates applied to it, making it vulnerable to attack.
Q:Adware
Computer software that is provided usually for free but contains advertisements.
Q:Footprinting (reconnaissance)
attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
Q:Internet
An electronic communications network that connects computer networks and organizational computer facilities around the world.
Q:Malware
software designed to infiltrate or damage a computer system without the user's normal functioning.Q:https: A secure form of Hypertext Transfer Protocol (HTTP) that is used to exchange information between webpages or access information found on a webpage.
Q:Vulnerability
A weakness that can be accidentally triggered or intentionally exploited
Q:Patch
A software update inserted (or patched) into the code of of an executable program that fixes bugs, installs new drivers.
Q:PPSI
Personal, private or sensitive information is any information where unauthorized access, disclosure, modification, destruction or disruption of access to or use of such information could severely impact the State Entity, its critical functions, its employees, its customers, third parties, or citizens of New York.
Q:Incident Response
Manual and automated procedures used to respond to reported incidents (real or suspected), systems failures and errors, and other undesirable events.
Q:Awareness
Having or showing realization, perception, or knowledge.
Q:Standards
a level of quality, achievement that is considered acceptable or desirable
Q:Threat
A potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
Q:Updates
To change (something) by including the most recent information
Q:Social Media
Forms of electronic communication in which users create online communities and share information, including photos, videos, and messages, etc.
Q:Procedures
A set of administrative instructions for implementation of a policy or standard
Q:Computer Infiltration
means unauthorized entering program code into computer system in order to perform undesired (often concealed) activities.
Q:SPAM
e-mail that is not wanted, e-mail that is sent to large numbers of people and that consists mostly of advertising