click below
click below
Normal Size Small Size show me how
Exam Def-Terms #1
Exam Prep Def-Terms #1
Term | Definition |
---|---|
Confidentiality | PRIVATE....This term relates to the act of sharing or revealing information only to authorized personnel. (PRIVATE...DATA IS SECURE ONLY TO PEOPLE WHO NEED TO HAVE IT) |
Integrity | TRUSTED....This term relates to the ability to ensure that information or data remains unchanged and accurate. (DATA CAN BE TRUSTED. NO CHANGES) |
Availability | READY....This term relates to ensuring data or service accessibility to those who require it, when they require it. |
Asset | PROPERTY....This term relates to property that belongs to an individual, organization, company, etc. (THINGS YOU WANT TO PROTECT) |
Threat | This term relates to the possibility of being a cyber attack target. |
Risk | This term relates to the POTENTIAL DAMAGE to an individual or organization that exists due to lack of security or awareness. |
Vulnerability | FLAW....This term relates to a weakness that can create risks. |
Exploitation | This term relates to taking advantage of vulnerabilities to gain access to and control over a system.(TAKING ADVANTAGE OF RISK) |
Firewall | This term relates to software that inspects, detects, and blocks traffic based on policies and parameters (IP, port, etc.) (FIRST LINE OF DEFENSE) |
Antivirus | This term relates to a software that inspects, detects, and removes malicious programs. (STOPS VIRUSES) |
Information Security | This term refers to defending and protecting the information itself, both digital and physical. (PROTECTING INFOMATION) |
Cybersecurity | This term refers to a field that is dedicated to defending and protecting cyberspace against all kinds of cyber threats and crimes.(PROTECTING CYBERSPACE) |
Malware | Software designed for malicious purposes, or malicious software. (MALICIOUS-WARE- Malicious means POISONOUS) |
Virus | Self-replicating software that targets systems in a computer and attaches itself to them upon execution. (SPECIFIC TASK- 1 TASK) |
Worm | This term refers to a self-replicating software similar to a virus, BUT DOES NOT REQUIRE USER INTERVENTION for it to be executed. It can spread to other computers, typically over a network. |
Trojan Horse | Malware that masquerades as a legitimate program but causes a lot of damage when executed. This Malware does not self-replicate like worms or viruses. They can, however, create backdoors in systems (LOOKS LIKE ITS LEGIT BUT IT'S MALWARE) |
Spyware | Malware that attempts to COLLECT information from a computer. (HIDES IN THE BACKGROUND) |
Ransomware | Malware that Encrypts (CONCEALS or HIDES) computer files and prevents them from being accessed or restored. (HIDES & HOLDS HOSTAGE) |
Encrypt/Encryption | CONCEALS or HIDES Data by Converting it into a code. (CONCEALS it then CONVERTS it) |
Phishing | Social Engineering Attack commonly done through email across a large audience |
ARP Poisoning | This Attack deceives a device on network, poisoning its table associations of other devices |
DNS Poisoning | This Attack Manipulates the information in DNS Records & use it to Redirect online traffic to a Malicious FAKE Website. |
ZERO Day Vulnerabilities | Vulnerabilities NOT YET Detected by Anti-Malware Software |
Man in the Middle (MiTM) | This Attack allows Attackers to Secretly Intercept Communications or Alter them |