n electronic device for storing and processing data according to instructions given to it in a software program.
What is a computer?
refers to programs and applications that run on a computer.
What us software?
data that could be used to identify a particular person. It includes items such as name, address, social security number, birthdate, telephone number, email address, text messages, and geographic location information.
What is PII Personally Identifiable Information
The art and science of using mathematics to secure information and create a high degree of trust in the electronic realm
What is cryptography?
A device or program that controls the flow of network traffic by enforcing security policies that allow or deny traffic to pass through the network
What is a firewall?
refers to the physical parts of a computer and related devices, such as chips, circuits, wires, monitor, keyboard, mouse, printer, scanner, hard drive, and RAM.
What is hardware?
a set of instructions forming a computer program that is executed by a computer.
What is program code?
anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
What is a threat?
The use of computer networks to gain illicit access to confidential information of a government or organization
What is cyber espionage?
Works to identify, communicate, and understand threats and mitigations within the context of protecting something of value
What is threat modeling?
a set of electronic circuitries and is the main processor that runs the operating system and the applications.
What is CPU?
a series of digits with the two symbols 1 and 0 that represent anything digitally.
What is binary code?
Gathering sensitive information by physically looking over a shoulder
What is shoulder surfing?
The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards
What is risk management?
What is Virtual Private Network
is the computer’s permanent memory where all files, programs, and the operating system are stored.
What is storage?
system software that coordinates the operation of hardware and software.
What is operating system?
hysical breach into a restricted area, also known as piggybacking
What is tailgating?
A technique in which an adversary compromises a system by convincing a human to violate the security policies in a way that enables the adversary to gain an advantage
What is social engineering?
What a hacker is looking for when they pin test
What is a vulnerabvility
the computer’s temporary quick-access memory where programs and data are loaded and accessed during processing.
What is RAM?
A global domain within the information environment consisting of the interdependent network of information systems infrastructures including the internet, telecommunications networks, computer systems, and embedded processors and controllers
What is Cyberspace?
Creating a false narrative using some true facts in order to build trust and credibility
What is pretexting?
A special operating system designed specifically for cybersecurity professionals, penetration testers, and people who want to learn about computer security
What is Kali Linux?
The famous person who had their phone hacked in the case study we examined last year.
Who is Jeff Bezos