Alexa Skill
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
speechAssets
speechAssets2
src
README.md
terms.txt

README.md

Security-Flashcards

Companion to the book Cyber Security Basics by Don Franke, available at Amazon.com.

This is a list of over 60 information security terms that are currently available for the Security Flashcards Alexa skill. To use as a study aid, try defining the term first, then ask Alexa for the definition to see if you got it right.

To use the skill

  1. Install the Security Flashcards Alexa skill on your Echo device
  2. Say open Security Flashcards to run

List of available security terms

  1. actor
  2. adversary
  3. anomalyous behavior
  4. asset
  5. asymmetric encryption
  6. attack surface
  7. attacker
  8. authentication
  9. authorization
  10. availability
  11. bastion host
  12. black box test
  13. black hat
  14. blue team
  15. buffer overflow
  16. chain of custody
  17. checksum
  18. clipping level
  19. command and control
  20. complete mediation
  21. confidentiality
  22. containerization
  23. credential
  24. cross site scripting
  25. cyber
  26. cyber intelligence
  27. decommision
  28. defenders dilema
  29. defense in depth
  30. deprecated
  31. detective control
  32. economy of mechanism
  33. entropy
  34. enumeration
  35. event
  36. exfiltrate
  37. exploit
  38. fail safe
  39. fail secure
  40. fingerprint
  41. firewall
  42. firmware
  43. fuzz testing
  44. garbage collection
  45. hardening
  46. honeypot
  47. hygiene
  48. incident
  49. indicator of compromise
  50. input validation
  51. integrity
  52. internet proxy
  53. jump server
  54. kill chain
  55. least common mechanism
  56. least privilege
  57. logic bomb
  58. maintenance hook
  59. malvertising
  60. malware
  61. masking
  62. miscreant
  63. misdirection
  64. non repudiation
  65. nonce
  66. open design
  67. output encoding
  68. patching
  69. pen test
  70. permissions snowball
  71. phishing
  72. polymorphism
  73. port
  74. preventative control
  75. private key
  76. privileged code
  77. public key
  78. ransom ware
  79. red team
  80. residual risk
  81. resilience
  82. reverse engineering
  83. salt
  84. secure boot
  85. secure computing
  86. separation of duties
  87. side channel attack
  88. social engineering
  89. spear phishing
  90. steganography
  91. symmetric encryption
  92. trojan horse
  93. trust boundary
  94. trusted platform module
  95. virtual patching
  96. virus
  97. vulnerability
  98. white box test
  99. white hat
  100. worm