click below
click below
Normal Size Small Size show me how
Cyber pt 1&2
Key terms in the Principle of information Secrity pt 1 & 2
Question | Answer |
---|---|
Cybersecurity | All the tool we use and action we take to keep computers, networks, and information safe and Available for those who need it and unavailable for those who should not have it. |
Cyber Ethics | The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society. |
Hacking | The act of circumventing or breaking past security boundaries. |
Hacker | A person who engages in hacking. |
Attack vector | The avenue or path hacker uses to commit the attack. |
White-hat hacker | ethical and law-abiding. |
Black-hat hacker | operates outside the law. |
Gray-hat hacker | do no harm, but do not ask for permission. |
Virus | A malicious software code that is unleashed and attempts to perform its destructive content. |
Cyberattack | A attempt to steal, damage, or destroy data or computer system. |
CIA triad | Are the three underlying principles of data protection. [C]onfidentiality, [I]ntegrity, [A]vailability |
Confidentiality | The condition of being private or secret. |
Integrity | Having important information in the state of being complete or uncorrupted. |
Availability | Having access to information when you need it. |
Vulnerability | This term refers to the weakness of an Asset that can be Exploited by one or more attackers |
Threat | Any event that has the potential to bring harm to an organization or individual. |
Risk | The potential or loss or damage when a threat exploits a vulnerability. |
Malware | A computer code intentionally written to cause some form of harm. |
Phishing | fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication. |
Password Attack | a third party trying to gain access to your systems by cracking a user’s password. |
Denial-of-Service Attack DDoS: | A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet. |
Ransomware | a type of malware from crypto virology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. |
Netiquette | Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting). |
Personally Identifiable Information PII | PII is any information specific to an individual. EX: ID, SSN |
Cyberbullies/cyberbullying | Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites). |
Cyberstalking | Methods individuals use to track, lure, or harass another person online. |
Risk Sites | Web sites on the worldwide web with hazard conditions to cyber/online safety. |