click below
click below
Normal Size Small Size show me how
Cybersecurity unit 1
Term | Definition |
---|---|
Breach | The act or result of breaking into something |
Confidentiality | People who shouldn't see the data can't see the data |
Integrity | They can rely on the data to be correct |
Accessibility | Available to the user when they need it |
Personally Identifiable Information | Information that can be used to distinguish or trace an individual identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual. |
Network administrator | They organize, install, and support an organizations computer systems, including local area networks (LANS), wide area networks (WANS), network segments, and other data communication systems |
White hat hacker | Hacker who violates the security of a system with the knowledge and consent of the owner or developer in order to test the code, without malicious intent. |
Black hat hacker | A hacker who violates the security of a system without the knowledge of consent of the owner or developer, as for personal profit or for gratification of causing damage. |
Grey hat hacker | Hackers that exploit networks and computer systems in the same way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. |
Sandbox | An environment in which software developers or editors can create and test new content in the project. |
Honeypot | A computer system, isolated from the rest of its network, established or bait to lure malicious hackers into engaging with it, thereby revealing the identity or technique of perpetrator without endangering the network or its data. |
Cybersecurity | Precaution taken to guard against crime that involves the internet, especially unauthorized access to computer systems and data connected to the internet. |
Doxing | A person's identifying information, as address, phone number, name, or alias, when maliciously posted online to target that person for pranks, fraud, or other harassment. |
Data | Individual facts, statistics, or item of information. |
Database | A comprehensive collection of related data organized for convenient access, generally in a computer. |
Vulnerability | open to vicious attack |
Ad networks | Gather data about users, the pages they visit, information they provide on those pages, how long they stay on a page, what links they click on from that page, etc. |
Data aggregators | Companies that create profiles of individuals based on not only their web surfing activities, but also public records, like property ownership, voter registration, phone company records, etc. |
Setting a cookie | Placing a small piece of text in your web browser's cache |
First party cookie | Can only be placed by the site you are visiting. |
Third party cookie | Can be placed by a site that is authorized to do so by the site you are on. |
Risk Analysis-Step 1 | Identify Assets |
Risk Analysis-Step 2- | Identify Threats |
Risk Analysis-Step 3- | Identify Source of threats |
Risk Analysis-Step 4- | Ranking threats |
Mitigation | Make something less severe |
Do not track settings | Tells ad networks that you do not wish to be tracked |
opt out | they set a cookie with a special ID that allow you not to be tracked. |