HSEP 101 cyber Security
Internet Service Provider (ISP)
A company that connects computers to the internet for a fee. Abbreviated to ISP.
What are the three fundamental goals that make up information security?
Confidentiality, Integrity, and Availability
The use and targeting of computers to obtain a secret of some sort.
Cyber espionage
The realm of computer networks and the users behind them, in which information is stored, shared, and communicated online.
Cyberspace
In 1972 Ray Tomlinson at the technical consulting firm BBN wrote a basic program to read, compose, and send messages. This was called.
A project to fight Internet censorship and provide technical help to those living under oppressive governments.
Hactivismo
The __________________________ serves as the address for endpoints on the Internet.
Internet Protocol
_____________________are the organizations that provide access to the Internet, as well as other related services like e-mail or hosting websites.
Internet service pro- vider (ISP)
cyberspace
a metaphor for describing the non-physical terrain created by computer systems
A cyberattack always first targets ____________________and the information within it.
another computer
Deliberate actions to alter, disrupt, deceive, degrade, or destroy computer systems or networks or the information and/or programs resident in or transiting these systems or networks.
cyber attacks
Premeditated, politically motivated attack against information, computer systems, computer programs, and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents.
cyberterrorism
Cyberspace relies on physical infrastructure and human users who are tied to___________, and thus is subject to our human notions like sovereignty, nationality, and property.
geography
In cyberspace, an attack can literally move at the speed of light, unlimited by ________________________________
geography and the political boundaries.
The US Department of Defense can be considered the________________.
god- father of cyberspace
Supervisory Control and Data Acquisition (SCADA) systems
industrial control systems; that monitor and run industrial processes.
Transport Control Protocols (TCP)
is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data.
As in other areas of cybersecurity, we have to be aware of ________________ and uses of the Internet and how bad actors might take advantage.
our own habits
What makes the Internet distinct from prior communication networks like the old telegraphs and telephone networks is that it is ________________ instead of circuit- switched
packet-switched
Domain Name System (DSN)
protocol and infrastructure through which computers connect domain names (human memorable names like Brookings.edu) to their corresponding IP addresses
Hypertext Transfer Protocol (HTTP)
protocol that defines how messages are formatted and transmitted over the World Wide Web
Packets
small digital envelopes of data.
Hacktivism
the authorized or unauthorized use of or destruction of electronic files in pursuit of a political or social goal
The takeaway for cybersecurity is that the entire system is based on___
trust