Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary CYB-1100: Foundations of Cybersecurity

Rating
-
Sold
-
Pages
11
Uploaded on
09-10-2025
Written in
2025/2026

CYB-1100: Foundations of Cybersecurity

Institution
Course

Content preview

CYB-1100: Foundations of Cybersecurity

, covers the security policies and the disaster response
Information Assurance
policies, which dictate information security and

cybersecurity

Covers the security of internal networks, files, data, tapes,
Information Security The act of protecting digital assets from both known and
Cybersecurity
and papers (digital and analog), both through hardware
unknown threats (securing data transmitted through the
and software. Encompasses cybersecurity
internet)
Malicious software that is intended to damage or disable
Malware
computers and computer systems. (virus, worm, trojan)

The effort of tricking the user into giving up both personal
Phising
and professional information by mimicking trusted

sources(Emails, websites, links)

The process of using computations to scramble data to make
Encryption
it inaccessible/unreadable without a certain key

Software or hardware that manages both incoming and
Firewall
outgoing network traffic, allowing certain types of access

and traffic and denying others.

Hackers use their social skills to trick people into revealing
Social Engineering
access credentials or other valuable information by

manipulating victims' emotions

A software flaw that is unknown to the software vendor,
Zero-day Vulnerability
which can immediately be exploited by attackers when the

software is released.

Attackers prevent access to a particular service to the base
Denial of Service Attack
that wants to access it by flooding the service, network, or

system with data, overloading it

a security process that requires a second form of

Multi-Factor Authentication verification, in addition to a password, to confirm a

user's identity and ensure that only the intended user

can access the service

A piece of software or hardware that detects anomalous
Intrusion Detection System (IDS)
behavior on a device, network, or system.

Written for

Course

Document information

Uploaded on
October 9, 2025
Number of pages
11
Written in
2025/2026
Type
SUMMARY

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
3 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions