Week 1 Flashcards
CIA
Conformation, Integrity, and Availability
Integrity
Keeping data accurate and untampered with
Confidentiality
Keep data hidden. Only need to know basis for files.
Availability
The information we have is readily accessible to those people that should have it
Risk
The possibility of suffering a loss in the event of an attack on the system
Vulnerability
A flaw in the system that could be exploited to compromise the system
0-day vulnerability (zero day)
A vulnerability that is not known to the software developer or vendor, but is known to an attacker
Exploit
Software that is used to take advantage of a security bug or vulnerability
Threat
The possibility of danger that could exploit a vulnerability
Hacker
Someone who attempts to break into or exploit a system
Attack
An actual attempt at causing harm to a system
Black hat hacker
Someone who exploits an vulnerability in a system for malicious purposes
White hat hacker
Someone who exploits an vulnerability in a system to alert the devs so they can fix it before someone tries to exploit it.
Malware
A type of malicious software that can be used to obtain your sensitive information, or delete or modify files
Common types of malware
Viruses, worms, adware, spyware, Trojans, root kids, backdoors, botnets