100 Cybersecurity Terms Flashcards Simplified for You
Made by Smart Teacher Platform

Set 1: Fundamentals
SIEM
Security Information and Event Management
CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
This is ensuring that only authorized people have access to data.
Integrity
This is keeping data accurate,complete and unaltered
Availability
This is the principle that ensures systems and data are accessible when needed.
Assets
These are important resosurces e.g data,hardwares,network devices and systems that are valuable to an organization.
Vulnerability
Weakness in a system that can be exploited by cybercriminals.
Exploit
This is taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
Threat
This is an activity intended to compromise the security of an information or system by altering the availability , integrity , or confidentiality of a system .
Risk
Risk is the potential for loss, harm, or adverse consequences resulting from an uncertain event.
Control
A security measure used to reduce risk and protect systems..
Authentication
This is the process in cyber security that verifies the identity of users, devices, or systems before granting access to resources.
Authorization
This is the process of determining whether a user has the right to access a specific resource or perform a particular action
Non-repudiation
– This is the proof that someone performed an action (e.g., digital signatures).
Encryption
The process of converting plain text (readable data) into ciphertext (unreadable code) to protect information from unauthorized access.
Decryption
The process of turning converting encrypted data (ciphertext) back into its original, readable form (plaintext)
Hashing
The process of transforming data into a fixed-length value that is used for integrity.
Firewall
This ia a network security that controls network traffic.
IDS
IDS ( Intrusion Detection System) observes network traffic for malicious transactions and sends immediate alerts when it is observed.
IPS
An Intrusion Prevention System (IPS) is a network security device or software application that monitors network traffic and takes automated actions to prevent potential threats and unauthorized access.
SOC
Security Operation Center is a centralized unit that monitors,detects,analyzes and responds to cyberthreats.
Blue Team
This is the group responsible for defending an organization’s networks and systems from attacks
Red Team
The red team is made up of offensive security experts who try to attack an organization’s cybersecurity defenses.
Purple Team
The combination of Red team and the Blue team together
Zero Trust
This is a cybersecurity strategy that requires strict identity verification for every user and device attempting to access resources, regardless of their location within or outside the network..
Set 2: Networking & Cloud
Threat Vector
Path attackers use to breach a system