Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

cybersecurity

Rating
-
Sold
-
Pages
6
Uploaded on
20-05-2024
Written in
2023/2024

document on cybersecurity glossary likely serves as a comprehensive reference for key terms and concepts in the field. It likely includes definitions and explanations of terms related to cybersecurity, such as encryption, malware, phishing, firewall, penetration testing, and more. Each entry may offer clarity on the terminology used in cybersecurity, providing readers with a deeper understanding of fundamental concepts and technologies. T

Show more Read less
Institution
Course

Content preview

Glossary
Cybersecurity


Terms and definitions from Course 1

A
Adversarial artificial intelligence: A technique that manipulates artificial intelligence
(AI) and machine learning (ML) technology to conduct attacks more efficiently

Antivirus software: A software program used to prevent, detect, and eliminate
malware and viruses

Asset: An item perceived as having value to an organization

Availability: The idea that data is accessible to those who are authorized to access it


B
Business Email Compromise (BEC): A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage


C
Cloud security: The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users

Compliance: The process of adhering to internal standards and external regulations

Computer virus: Malicious code written to interfere with computer operations and
cause damage to data and software

Confidentiality: Only authorized users can access specific assets or data

Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies

, Cryptographic attack: An attack that affects secure forms of communication
between a sender and intended recipient

Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation




D
Database: An organized collection of information or data

Data point: A specific piece of information


H
Hacker: Any person who uses computers to gain access to computer systems,
networks, or data

Hacktivist: A person who uses hacking to achieve a political goal

Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients’ health information


I
Integrity: The idea that the data is correct, authentic, and reliable

Internal threat: A current or former employee, external vendor, or trusted partner
who poses a security risk

Intrusion detection system (IDS): An application that monitors system activity and
alerts on possible intrusions


L
Linux: An open-source operating system

Log: A record of events that occur within an organization’s systems

Written for

Institution

Document information

Uploaded on
May 20, 2024
Number of pages
6
Written in
2023/2024
Type
Class notes
Professor(s)
Student
Contains
All classes

Subjects

$5.59
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
snhareddyz

Get to know the seller

Seller avatar
snhareddyz
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions