HSEP 101 cyber Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Internet Service Provider (ISP)

A company that connects computers to the internet for a fee. Abbreviated to ISP.

What are the three fundamental goals that make up information security?

Confidentiality, Integrity, and Availability

The use and targeting of computers to obtain a secret of some sort.

Cyber espionage

The realm of computer networks and the users behind them, in which information is stored, shared, and communicated online.

Cyberspace

In 1972 Ray Tomlinson at the technical consulting firm BBN wrote a basic program to read, compose, and send messages. This was called.

Email

A project to fight Internet censorship and provide technical help to those living under oppressive governments.

Hactivismo

The __________________________ serves as the address for endpoints on the Internet.

Internet Protocol

_____________________are the organizations that provide access to the Internet, as well as other related services like e-mail or hosting websites.

Internet service pro- vider (ISP)

cyberspace

a metaphor for describing the non-physical terrain created by computer systems

A cyberattack always first targets ____________________and the information within it.

another computer

Deliberate actions to alter, disrupt, deceive, degrade, or destroy computer systems or networks or the information and/or programs resident in or transiting these systems or networks.

cyber attacks

Premeditated, politically motivated attack against information, computer systems, computer programs, and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents.

cyberterrorism

Cyberspace relies on physical infrastructure and human users who are tied to___________, and thus is subject to our human notions like sovereignty, nationality, and property.

geography

In cyberspace, an attack can literally move at the speed of light, unlimited by ________________________________

geography and the political boundaries.

The US Department of Defense can be considered the________________.

god- father of cyberspace

Supervisory Control and Data Acquisition (SCADA) systems

industrial control systems; that monitor and run industrial processes.

Transport Control Protocols (TCP)

is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data.

As in other areas of cybersecurity, we have to be aware of ________________ and uses of the Internet and how bad actors might take advantage.

our own habits

What makes the Internet distinct from prior communication networks like the old telegraphs and telephone networks is that it is ________________ instead of circuit- switched

packet-switched

Domain Name System (DSN)

protocol and infrastructure through which computers connect domain names (human memorable names like Brookings.edu) to their corresponding IP addresses

Hypertext Transfer Protocol (HTTP)

protocol that defines how messages are formatted and transmitted over the World Wide Web

Packets

small digital envelopes of data.

Hacktivism

the authorized or unauthorized use of or destruction of electronic files in pursuit of a political or social goal

The takeaway for cybersecurity is that the entire system is based on___

trust


संबंधित स्टडी सेट्स

Chapter 1 - Leading Edge Management

View Set

Structural Units of The Human Body

View Set

Chapter 5: The Lipids; Triglycerides, Phospholipids, and Sterols

View Set

Network Pro Part 3 ++++++++++++++++++++++++

View Set

Management 310- LATech Dickerson (Test II)

View Set

Chapter 43: Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder - ML4

View Set