& Software
The physical tools we use to interface with our digital systems.
What is I.T. Hardware?
The digital tools we use to interface with data or systems.
What is I.T. Software?
This is a network the size of a office building or school.
What is a LAN?
This is produced by programming.
What is an App, Application, Program, Script, etc.?
This is the general name for a piece of software that nefariously interacts with systems or data.
What is Malware?
These are devices that enter data into systems.
What is input devices.
This is a collection of software, utilities and data that allow you to use the full functionality of your system.
What is an operating system?
This is the network around a single person (ex. Bluetooth)
PAN
This is a popular programming language named after a snake.
What is python?
This is an attack that seeks to steal your information by deceiving you with a request.
What is Phishing?
These are devices that take data from systems and export them into the real world.
This is the simple piece of software that allows you to use the basic functions of your system.
What is the BIOS / UEFI?
The internet is an example of this type of network.
What is a WAN?
This is the programming language on which websites are built.
What is HyperText Markup Language.
This is a Phishing attack targeted at a certain person (ex. head of a company).
What is Spear Phishing?
This is working on data, also the P in CPU.
What is Processing?
This is the use of software to access some data or functions by a provider (ex. Netflix).
What is a service?
This is the A in LAN.
What is Area?
This is a piece of software used to make programming faster and simpler.
What is an Integrated Development Environment?
These are potential violation of security policies or procedures.
What is a Cybersecurity Vulnerability?
This device is both an input and output device that does processing on the data.
What is the Computer Tower, System, or "CPU"?
A series of ones and zeroes.
How is data stored on a computer?
This is the type of cable used in most home and small office networks.
What is Ethernet or CAT 5,6,7 etc.
This is the instructions that computers convert ones and zeroes to.
What is machine code / assembly?
This is the likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
What is a Cybersecurity Risk?