1/19
A collection of vocabulary terms and definitions related to Cyber Security, covering key concepts, roles, and models.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cyber Security
The collection of tools, policies, security concepts, safeguards, guidelines, risk management, and technologies used to protect cyberspace and users' assets.
CIA Triad Model
A cybersecurity model consisting of three pillars: Confidentiality, Integrity, and Availability.
Confidentiality
Protecting private information from unauthorized access.
Integrity
Ensuring that data is consistent, reliable, and accurate.
Availability
The assurance that information is accessible to authorized users when needed.
Cybercrime
Criminal activities that use or target computers, computer networks, or networked devices.
Vulnerability
A weakness in hardware, software, or online services that attackers can exploit.
Risk
The potential for damage, loss, or destruction when a threat exploits a vulnerability.
Threat
Any circumstance or event with the potential to harm operations, functions, or reputation.
EG-CERT
Egyptian Computer Emergency Readiness Team, established to address information security incidents and secure national cyberspace.
ESCC
Egyptian Supreme Cybersecurity Council, responsible for developing the National Cybersecurity Strategic Plan.
Phishing
A cyber attack that seeks to steal sensitive information by masquerading as a trustworthy entity in electronic communications.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
Multi-Factor Authentication (MFA)
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
Denial-of-Service (DOS) Attack
An attack intended to make a machine or network resource unavailable to its intended users.
Ransomware
A type of malicious software that threatens to publish the victim's data or block access to it unless a ransom is paid.
Digital Transformation
The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.
Cyber Hacking
The act of compromising digital devices and networks through unauthorized access.
Public Internet Access Threats
Risks associated with using unsecured public Wi-Fi networks.
Industry Standards for Cybersecurity
Best practices and guidelines that organizations follow to protect their information and systems.