external security threats
attacks originating from outside of an organization
IoT
global network of machines and devices capable of interacting with each other
CIA triad
Confidentiality, Integrity, Availability
methods to ensure integrity
file permissions, user access control, version control, and checksums
motivation of black hat hacker
taking advantage of any vulnerability for illegal personal gain
ethics or morality
difference between a white hat and a black hat hacker
privacy
confidentiality of information
ethics
the principles of right and wrong that guide an individual in making decisions
availability
the term that describes the services and data being well maintained and able to be be accessed all the
time
stuxnet
a malware program designed to damage the nuclear enrichment plant of Iran, a program which is an
example of a state-sponsored attack
methods to ensure confidentiality
data encryption, username ID and password, two factor authentication, etc.
International Multilateral Partnership Against Cyber Threats (IMPACT)
a global partnership of world governments, industries, and academia dedicated to improving global
capabilities when dealing with cyber threats
integrity
the term that indicates accuracy, consistency, and trustworthiness of the data