cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What is a "Hacker" in cybersecurity?

An individual who explores and often exploits vulnerabilities in computer systems or networks.

2
New cards

What is a "White Hat Hacker"?

An ethical hacker who uses their skills to identify vulnerabilities and improve security, with permission from the system owner.

3
New cards

What is a "Black Hat Hacker"?

A malicious hacker who exploits vulnerabilities for illegal or unethical purposes, often for personal gain or to cause damage.

4
New cards

What is a "Grey Hat Hacker"?

A hacker who may identify vulnerabilities without permission but discloses them to the owner, often seeking a bounty or recognition, blurring ethical lines.

5
New cards

What does "CIA Triad" stand for in cybersecurity?

A fundamental security model representing three key principles: Confidentiality, Integrity, and Availability.

6
New cards

Define "Confidentiality" in the CIA Triad.

The principle that information should not be disclosed to unauthorized individuals, entities, or processes.

7
New cards

Define "Integrity" in the CIA Triad.

The principle that information should remain accurate, consistent, and trustworthy throughout its lifecycle, preventing unauthorized modification.

8
New cards

Define "Availability" in the CIA Triad.

The principle that authorized users should have timely and uninterrupted access to information and resources when needed.

9
New cards

What is "Malware"?

Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.

10
New cards

What is a "Virus"?

A type of malware that attaches itself to legitimate programs and spreads to other computers when those programs are executed, often causing damage or data corruption.