CYB-1100: Foundations of Cybersecurity
, covers the security policies and the disaster response
Information Assurance
policies, which dictate information security and
cybersecurity
Covers the security of internal networks, files, data, tapes,
Information Security The act of protecting digital assets from both known and
Cybersecurity
and papers (digital and analog), both through hardware
unknown threats (securing data transmitted through the
and software. Encompasses cybersecurity
internet)
Malicious software that is intended to damage or disable
Malware
computers and computer systems. (virus, worm, trojan)
The effort of tricking the user into giving up both personal
Phising
and professional information by mimicking trusted
sources(Emails, websites, links)
The process of using computations to scramble data to make
Encryption
it inaccessible/unreadable without a certain key
Software or hardware that manages both incoming and
Firewall
outgoing network traffic, allowing certain types of access
and traffic and denying others.
Hackers use their social skills to trick people into revealing
Social Engineering
access credentials or other valuable information by
manipulating victims' emotions
A software flaw that is unknown to the software vendor,
Zero-day Vulnerability
which can immediately be exploited by attackers when the
software is released.
Attackers prevent access to a particular service to the base
Denial of Service Attack
that wants to access it by flooding the service, network, or
system with data, overloading it
a security process that requires a second form of
Multi-Factor Authentication verification, in addition to a password, to confirm a
user's identity and ensure that only the intended user
can access the service
A piece of software or hardware that detects anomalous
Intrusion Detection System (IDS)
behavior on a device, network, or system.
, covers the security policies and the disaster response
Information Assurance
policies, which dictate information security and
cybersecurity
Covers the security of internal networks, files, data, tapes,
Information Security The act of protecting digital assets from both known and
Cybersecurity
and papers (digital and analog), both through hardware
unknown threats (securing data transmitted through the
and software. Encompasses cybersecurity
internet)
Malicious software that is intended to damage or disable
Malware
computers and computer systems. (virus, worm, trojan)
The effort of tricking the user into giving up both personal
Phising
and professional information by mimicking trusted
sources(Emails, websites, links)
The process of using computations to scramble data to make
Encryption
it inaccessible/unreadable without a certain key
Software or hardware that manages both incoming and
Firewall
outgoing network traffic, allowing certain types of access
and traffic and denying others.
Hackers use their social skills to trick people into revealing
Social Engineering
access credentials or other valuable information by
manipulating victims' emotions
A software flaw that is unknown to the software vendor,
Zero-day Vulnerability
which can immediately be exploited by attackers when the
software is released.
Attackers prevent access to a particular service to the base
Denial of Service Attack
that wants to access it by flooding the service, network, or
system with data, overloading it
a security process that requires a second form of
Multi-Factor Authentication verification, in addition to a password, to confirm a
user's identity and ensure that only the intended user
can access the service
A piece of software or hardware that detects anomalous
Intrusion Detection System (IDS)
behavior on a device, network, or system.