Lesson 6: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats Flashcards
Protection from hostile forces that intend to compromise the normal state of being of something
Security
Computer Security and Cybersecurity aims to preserve these three things (CIA):
Confidentiality of Data
Integrity of Data
Availability of Data
The state of being safe from malicious actors
Security
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing ability
Risk
______ is meant to be taken, while ________ is the holistic goal of every computer administrator / owner.
Risk…security
An intentional breach of digital security often involves a deliberate act that is against the law
Cybercrime
A formal and umbrella term for anyone who maliciously acts upon a computer system
Threat actors
Individuals who want to attack computers but lack the knowledge and networks needed to do so
Script Kiddies
Usually downloads pre-made hacking tools coded by other hackers
Script Kiddies
A threat actor that breaks through a computer security without required permission
Hacker
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions
Cracker
Attacks a nation’s national computer systems, mostly power grids and tech infrastructure that comprises national security, to instill fear and insecurity
Cyberterrorists
Threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network - if they are not paid a sum of money
Cyberextortionist
A common way to trick people to entering their passwords and other info to websites controlled by threat actors
Phishing
An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes
RA 10175 - Anti-Cybercrime Act of 2012
Is the discovery, collection, and analysis of evidence found on computers and networks
Digital Forensics
Involves the examination of media, program, data, and log files on computers, mobile devices, servers, and networks
Digital Forensics