What is Cybersecurity (Unit 1)
gray hat hackers
hack without permission, usually contacting organizations once vulnerabilities are found and requesting payment
hactivism
hacking to promote a political agenda or social change.
Internet of Things (IoT)
network of devices with the ability to connect and exchange data.
cybersecurity
protection of computer systems, networks or data from digital attacks.
availability
CIA triad component: Assurance that systems and data are available to authorized users when and where they are needed.
integrity
CIA triad component: information is protected from unauthorized or unintentional alteration.
confidentiality
CIA triad component: the protection of information from people who are not authorized to view it.
Bug Bounty Program
Offered by organizations to approved outside hackers who attack their system and find vulnerabilities.
CIA triad
Security measure that defines a secure system. Confidentiality, Integrity, Availability
cookies
files that are sent to your computer from certain websites to track your behavior and transactions.
penetration test
an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system
White-hat hackers (ethical hackers)
break into systems for non-malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses
black hat hackers
break into systems to destroy information or for illegal gain, or to deny authorized users access.
demographics
statistical data relating to the population and particular groups within it.
Hacking
unauthorized access, modification, or use of an electronic device or some element of a computer system