INFS2701 W1 foundations of cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:41 AM on 1/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

security

being protected from risk of loss, damage, unwanted modification and hazards

2
New cards

information security

Protecting information and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction

3
New cards

cybersecurity

range of practices, processes, and technologies intended to protect devices, networks, programs, and data from attacks and unauthorised access

protecting data + technologies which store data

4
New cards

data vs information

  • Data = unprocessed, without context

  • Information = processed data

5
New cards

difference between cybersecurity and information security

6
New cards

ACM

Association for Computing Machinery

7
New cards

Structure of cybersecurity discipline based on ACM

computing based but interdisciplinary field

  • Non-technical elements filter down into the technical/done through the lens/context of Policy, Law, Ethics

  • Technical elements = foundation

8
New cards

technical elements of cybersecurity

computer science + engineering

Information tech

information systems

software engineering

9
New cards

difference between IS and IT

  • IS = Hardware + Software + Data + People + Procedures

  • IT = Hardware + Software + Data 

10
New cards

social cybersecurity

  • Emerging area in science to understand and forecast how cyber-security is changing people behaviour, social, cultural, political outcomes, and accordingly build cyber-infrastructure to protect society

11
New cards

Cyberbiosecurity/biocybersecurity:

new speciality to understand and mitigate new biological security risks emerging at the interface between biosecurity and cybersecurity

12
New cards

malicious insider threat

Someone who intentionally abuses their authorised access to cause harm.

13
New cards

Negligent Insider:

Someone who causes a security incident through carelessness or lack of awareness. 

14
New cards

professional insider

An insider who misuses access as part of their professional role, often while appearing legitimate.

15
New cards

compromised insider

A legitimate user whose account or credentials have been taken over by an external attacker.

16
New cards

threat: compromised intellectual property

piracy, copyright infringement

17
New cards

threat: deviations in quality of service

internet service provider

power

WAN service

18
New cards

threat: espionage or trespass

unauthorised access and/or data collection

19
New cards

threat: forces of nature

fire, floods, earthquakes, lightning

20
New cards

threat: human error or failure

accidents, employee mistakes

21
New cards

threat: information extortion

blackmail, information disclosure

22
New cards

threat: sabotage or vandalism

destruction of systems or information

23
New cards

threat: software attacks

viruses, worms, macros, denial of service

24
New cards

threat: technical hardware failures or errors

equipment failure

25
New cards

threat: technical software failures or errors

bugs, code problems, unknown loopholes

26
New cards

threat: technological obsolescence

antiquated or outdated technologies

27
New cards

threat: theft

illegal confiscation of equipment or information

28
New cards
29
New cards
30
New cards

non-technical elements

risk management

law + ethics + policy

human factors

criminology

psychology

business administration