What is Cybersecurity (Unit 1)

Ace your homework & exams now with Quizwiz!

Bug Bounty Program

Offered by organizations to approved outside hackers who attack their system and find vulnerabilities.

availability

CIA triad component: Assurance that systems and data are available to authorized users when and where they are needed.

integrity

CIA triad component: information is protected from unauthorized or unintentional alteration.

confidentiality

CIA triad component: the protection of information from people who are not authorized to view it.

CIA triad

Security measure that defines a secure system. Confidentiality, Integrity, Availability

penetration test

an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system

White-hat hackers (ethical hackers)

break into systems for non-malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses

black hat hackers

break into systems to destroy information or for illegal gain, or to deny authorized users access.

cookies

files that are sent to your computer from certain websites to track your behavior and transactions.

gray hat hackers

hack without permission, usually contacting organizations once vulnerabilities are found and requesting payment

hactivism

hacking to promote a political agenda or social change.

Internet of Things (IoT)

network of devices with the ability to connect and exchange data.

cybersecurity

protection of computer systems, networks or data from digital attacks.

demographics

statistical data relating to the population and particular groups within it.

Hacking

unauthorized access, modification, or use of an electronic device or some element of a computer system


Related study sets

Ch. 55: Mgmt of Pts w/ Urinary Disorders

View Set

HIT201A Final Exam Chp 1-13 Horton

View Set

The Science of Nutrition: Chapter 1, science of nutrition chapter 3, science of nutrition chapter 2, The Science of Nutrition, Chapter 4, The Science of Nutrition, Chapter 5, The Science of Nutrition, 3e Chapter 6, the science of nutrition chapters...

View Set

Linux Chapter 9 - Archiving and Compression

View Set

PN NCLEX Evolve Medication/IV calculations

View Set