Introduction to Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

These flashcards contain key vocabulary terms and definitions related to the field of cybersecurity, helping students understand essential concepts for their exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Cybersecurity

The protection of digital devices and their communication channels from unauthorized access or threats.

2
New cards

Ethical Hacking

The practice of intentionally probing computer systems for vulnerabilities, but with permission, to improve security.

3
New cards

Insider Threats

Security risks that originate from within the organization, typically involving employees or contractors.

4
New cards

Data in Transit

Data that is actively moving from one location to another, such as across the internet.

5
New cards

Data in Storage

Data that is saved and stored on devices or databases, not currently being transferred.

6
New cards

Data in Process

Data that is actively being used or processed by a computing system.

7
New cards

Confidentiality

The principle of keeping information private and only accessible to authorized users.

8
New cards

Integrity

The assurance that information is accurate and reliable, and has not been tampered with.

9
New cards

Availability

The guarantee that information and resources are accessible to authorized users when needed.

10
New cards

Stuxnet,

A computer worm that targeted Iranian nuclear facilities, representing a significant example of cyber warfare.

11
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

12
New cards

Cloud Computing

The delivery of computing services over the internet, allowing storage and processing of data remotely.

13
New cards

Personal Data

Information that can identify an individual, including medical records, financial information, and online activity.

14
New cards

Types of Cyber Attackers

Includes black hats (criminal hackers), white hats (ethical hackers), and gray hats (hackers without malicious intent).