Lesson 2 Flashcards
It is the most common option/format for teaching online. Click the image below to play the video clip, which summarizes the purpose of ____?.
is a software application designed to manage, deliver, and track educational courses, training programs, and learning and development programs.
Learning management system (LMS)
often referred to as malware, are software designed to harm or disable computer systems without the owner’s knowledge.
Malicious programs
What are the classes of malicious software?
Viruses, worms, Trojans, bots, and phishing
is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses a wide range of technologies, processes, and practices designed to safeguard sensitive information and ensure the confidentiality, integrity, and availability of data.
Cyber security
What are the two types of security threats?
Internal threats originate from within an organization, posing risks from authorized individuals who have access to sensitive information or systems.These threats can be intentional or unintentional, arising from
External threats originate from outside the organization, posing risks from unauthorized individuals or entities seeking to compromise systems, steal data, or disrupt operations.
What are the three types of attackers?
Amateurs, hackers, and organized hackers
An internet based conflict that involves the penetration of computer systems and networks of other nations. This attackers have the resources and expertise to launch massive internet based attacks against other nations to cause damage or distract services, such as shutting down a power grid.
Cyber warfare
is the principle of keeping information secret and private, ensuring that it is only accessed by authorized individuals.
Confidentially
in the context of cybersecurity, refers to the assurance that data and information remain accurate, complete, and unaltered.It ensures that data has not been tampered with, corrupted, or modified in any unauthorized way.
Integrity
refers to the amount of time a device, service, or piece of infrastructure is usable or accessible.
Availability
Are the programs that browse documents for specified keywords and returns a list of the documents where the keywords were found
Search engines
What are the common types of search engines l
- local
- meta search engine
- blog from blogs (web logs)