Cybersecurity
Terms and definitions from Course 1
A
Adversarial artificial intelligence: A technique that manipulates artificial intelligence
(AI) and machine learning (ML) technology to conduct attacks more efficiently
Antivirus software: A software program used to prevent, detect, and eliminate
malware and viruses
Asset: An item perceived as having value to an organization
Availability: The idea that data is accessible to those who are authorized to access it
B
Business Email Compromise (BEC): A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage
C
Cloud security: The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users
Compliance: The process of adhering to internal standards and external regulations
Computer virus: Malicious code written to interfere with computer operations and
cause damage to data and software
Confidentiality: Only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
, Cryptographic attack: An attack that affects secure forms of communication
between a sender and intended recipient
Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation
D
Database: An organized collection of information or data
Data point: A specific piece of information
H
Hacker: Any person who uses computers to gain access to computer systems,
networks, or data
Hacktivist: A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients’ health information
I
Integrity: The idea that the data is correct, authentic, and reliable
Internal threat: A current or former employee, external vendor, or trusted partner
who poses a security risk
Intrusion detection system (IDS): An application that monitors system activity and
alerts on possible intrusions
L
Linux: An open-source operating system
Log: A record of events that occur within an organization’s systems