Cyber Security 2026 Overview

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

A collection of vocabulary terms and definitions related to Cyber Security, covering key concepts, roles, and models.

Last updated 1:30 AM on 4/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Cyber Security

The collection of tools, policies, security concepts, safeguards, guidelines, risk management, and technologies used to protect cyberspace and users' assets.

2
New cards

CIA Triad Model

A cybersecurity model consisting of three pillars: Confidentiality, Integrity, and Availability.

3
New cards

Confidentiality

Protecting private information from unauthorized access.

4
New cards

Integrity

Ensuring that data is consistent, reliable, and accurate.

5
New cards

Availability

The assurance that information is accessible to authorized users when needed.

6
New cards

Cybercrime

Criminal activities that use or target computers, computer networks, or networked devices.

7
New cards

Vulnerability

A weakness in hardware, software, or online services that attackers can exploit.

8
New cards

Risk

The potential for damage, loss, or destruction when a threat exploits a vulnerability.

9
New cards

Threat

Any circumstance or event with the potential to harm operations, functions, or reputation.

10
New cards

EG-CERT

Egyptian Computer Emergency Readiness Team, established to address information security incidents and secure national cyberspace.

11
New cards

ESCC

Egyptian Supreme Cybersecurity Council, responsible for developing the National Cybersecurity Strategic Plan.

12
New cards

Phishing

A cyber attack that seeks to steal sensitive information by masquerading as a trustworthy entity in electronic communications.

13
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer or network.

14
New cards

Multi-Factor Authentication (MFA)

A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.

15
New cards

Denial-of-Service (DOS) Attack

An attack intended to make a machine or network resource unavailable to its intended users.

16
New cards

Ransomware

A type of malicious software that threatens to publish the victim's data or block access to it unless a ransom is paid.

17
New cards

Digital Transformation

The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.

18
New cards

Cyber Hacking

The act of compromising digital devices and networks through unauthorized access.

19
New cards

Public Internet Access Threats

Risks associated with using unsecured public Wi-Fi networks.

20
New cards

Industry Standards for Cybersecurity

Best practices and guidelines that organizations follow to protect their information and systems.