Miscellaneous Terms Flashcards
CIA Triad
One of the most commonly used security models in the cybersecurity industry. CIA stands for Confidentiality, Integrity, and Availability
Confidentiality
To protect data from unauthorized access.
- Only the people who should see the data should have permission to view it.
- Use secure methods, such as encryption, when storing the data and sharing data across a network.
Integrity
To ensure that data is never tampered with
- Give permission to update the data only to the users who are authorized users at all times
Availability
To ensure that data is readily accessible to the authorized users at all times.
- Minimum downtime
- UPS (Uninterrupted Power Supply) for network systems
- Rapid system recovery in case of a disaster
IoT (Internet of Things)
The network of devices (including computers, mobile devices, home appliances, vehicles, and other electronic devices) that are connected to the internet, enabling the sending and receiving of data among them.
Unauthorized Hacker
The unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts. Their behavior is meant to cause harm, to draw attention to something, or to achieve personal gain.
Authorized Hacker
The ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities. They report vulnerabilities and improve the security of a system. Their behavior is noble and their actions align with society’s greater good.
In-Between Hacker
Uses illegal and/or unethical means to discover a system’s security vulnerabilities. Typically, gray-hat hackers access systems illegally - without permission - but then share their findings and report problems they find.
Packet
Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.
Pen (Penetration) test
Performing a computer attack to evaluate the security of a system
IIS (Internet Information Services) Manager
A convenient administration tool for the Microsoft IIS web server. It allows administrators to define the behavior and structure of websites run by IIS and supports secure site configurations.
Hardening
In terms of computer science, hardening a system means to increase its security and reduce its vulnerabilities.
Abstraction
A very common concept in computer science and information technology; it means that a lot of the details of a system or a process are hidden, allowing the user to focus on the details that are important for the task at hand.
HTML tag
A code that defines every structure on a HTML page, such as text, images, and links. HTML tags begin with a less than (<) character and end with a greater than (>).
Examples: < p >, < script >, < i > (Remove Spaces)
Linux
An operating system similar in concept to the Windows OS but used more often to host routers and web servers