1/13
These flashcards contain key vocabulary terms and definitions related to the field of cybersecurity, helping students understand essential concepts for their exam.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
The protection of digital devices and their communication channels from unauthorized access or threats.
Ethical Hacking
The practice of intentionally probing computer systems for vulnerabilities, but with permission, to improve security.
Insider Threats
Security risks that originate from within the organization, typically involving employees or contractors.
Data in Transit
Data that is actively moving from one location to another, such as across the internet.
Data in Storage
Data that is saved and stored on devices or databases, not currently being transferred.
Data in Process
Data that is actively being used or processed by a computing system.
Confidentiality
The principle of keeping information private and only accessible to authorized users.
Integrity
The assurance that information is accurate and reliable, and has not been tampered with.
Availability
The guarantee that information and resources are accessible to authorized users when needed.
Stuxnet,
A computer worm that targeted Iranian nuclear facilities, representing a significant example of cyber warfare.
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Cloud Computing
The delivery of computing services over the internet, allowing storage and processing of data remotely.
Personal Data
Information that can identify an individual, including medical records, financial information, and online activity.
Types of Cyber Attackers
Includes black hats (criminal hackers), white hats (ethical hackers), and gray hats (hackers without malicious intent).