1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cybersecurity
The practice of protecting systems, networks, and data from unauthorized access or attacks.
CIA Triad
The three pillars of security: confidentiality, integrity, and availability.
Risk Management
The process of identifying, assessing, and mitigating threats that could harm organizational assets.
Threat
A potential danger that could exploit a weakness and cause harm to systems or data.
Vulnerability
A weakness in technology, processes, or people that can be exploited by threats.
Malware
Malicious software such as viruses, worms, or ransomware designed to disrupt or damage systems.
Phishing
A deceptive attack tricking users into revealing sensitive information or installing malware.
Encryption
Converting data into a secure format that requires a key to access.
Multi-Factor Authentication (MFA)
A security measure requiring multiple forms of identity verification.
Business Continuity Planning (BCP)
Preparing procedures and systems to ensure organizations can operate during and after disruptions.