What is Cybersecurity (Unit 1)

Ace your homework & exams now with Quizwiz!

gray hat hackers

hack without permission, usually contacting organizations once vulnerabilities are found and requesting payment

hactivism

hacking to promote a political agenda or social change.

Internet of Things (IoT)

network of devices with the ability to connect and exchange data.

cybersecurity

protection of computer systems, networks or data from digital attacks.

availability

CIA triad component: Assurance that systems and data are available to authorized users when and where they are needed.

integrity

CIA triad component: information is protected from unauthorized or unintentional alteration.

confidentiality

CIA triad component: the protection of information from people who are not authorized to view it.

Bug Bounty Program

Offered by organizations to approved outside hackers who attack their system and find vulnerabilities.

CIA triad

Security measure that defines a secure system. Confidentiality, Integrity, Availability

cookies

files that are sent to your computer from certain websites to track your behavior and transactions.

penetration test

an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's information system

White-hat hackers (ethical hackers)

break into systems for non-malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses

black hat hackers

break into systems to destroy information or for illegal gain, or to deny authorized users access.

demographics

statistical data relating to the population and particular groups within it.

Hacking

unauthorized access, modification, or use of an electronic device or some element of a computer system


Related study sets

4 - B Commercial General Liability_Revised

View Set

Lippincott: Nursing Care During Pregnancy

View Set

Community Mental Health Nursing Questions

View Set