Skip to content

Keyboard shortcuts

Go home G then H
Browse sets G then B
Create set G then C
My library G then L
Show shortcuts ?
Go back Swipe from left edge

Computer Networks — Security

Core cybersecurity concepts and threat vocabulary

T
threat_model_tm 15 terms Feb 19, 2026
Flashcards
Learn
Written
Match
Test
Blitz

Terms 15

1
Encryption
Converting data into unreadable format using an algorithm and key
2
Public Key Cryptography
Uses key pair (public and private) for encryption; RSA, ECC
3
Phishing
Fraudulent attempt to obtain credentials by impersonating trusted entities
4
Man-in-the-Middle Attack
Attacker secretly intercepts and potentially alters communication
5
DDoS
Distributed Denial of Service; overwhelming a server with traffic to crash it
6
SQL Injection
Inserting malicious SQL into input fields to manipulate a database
7
Cross-Site Scripting (XSS)
Injecting malicious scripts into webpages viewed by other users
8
Two-Factor Authentication
Requiring two verification methods to access an account
9
Zero-Day Exploit
Attack targeting a vulnerability unknown to the software vendor
10
Social Engineering
Manipulating people into revealing confidential information
11
Penetration Testing
Authorized simulated attack to identify security vulnerabilities
12
Ransomware
Malware encrypting victim's files and demanding payment for decryption
13
Firewall
System monitoring and controlling incoming and outgoing network traffic
14
Hash Function
One-way function converting data to fixed-length string; used for passwords
15
CIA Triad
Confidentiality, Integrity, Availability; foundational security principles