What are the main components of a computer
CPU, RAM, storage (HDD/SSD), motherboard, GPU, power supply.
what is an operating system
fundamental software that manages a computer's hardware and software resources, acting as a bridge between the user and the hardware.
Ethical Hacking
Using hacking techniques with consent to identify and address security vulnerabilities.
Protection of sensitive information
Cyber security aims to safeguard confidential data, including personal information, financial records, and intellectual property.
MISP
A freely available open-source platform designed to collect, store, distribute, and share cyber security indicators and threats. It's used by incident analysts, security professionals, and malware reversers to share structured information effectively.
What is the purpose of the CPU?
Central Processing Unit, the brain of the computer, executes instructions.
what does an operating system do
manage and control all the hardware and software resources, enabling users to interact with the device and run programs efficiently.
Confidentiality
Protecting sensitive information and maintaining privacy are crucial.
Defense against cyberattacks
This includes protecting against malware, phishing scams, ransomware, and other malicious attacks.
MISC
A collaborative group in Marin County, California, that helps share information security best practices, resources, and technical expertise among community partners.
What is RAM
Random Access Memory, short-term memory for active processes.
what are 5 operating system
ios, android, windows, manOS, chrome.
Transparency
Being open about data collection, usage, and access control.
Maintaining system integrity and availability
Cyber security ensures that computer systems and networks function reliably and are not compromised or disrupted by unauthorized access or attacks.
Miscellaneous Attacks
In cybersecurity contexts, "misc" can also refer to a category of attacks that don't fit neatly into other, more defined types. These might include attacks that exploit vulnerabilities in web servers, firewalls, or proxy servers, or attacks that take advantage of how web browsers handle JSON data.
What is the difference between an HDD and an SSD?
HDD (Hard Disk Drive) uses spinning platters, while SSD (Solid State Drive) uses flash memory.
What security is provided by operating systems?
investors by corporations and governments
Risk Assessment
Conducting thorough assessments to identify potential vulnerabilities and threats.
Incident response and recovery
Cyber security also involves having plans in place to respond to and recover from cyberattacks and data breaches.
General Usage
Misc" is also sometimes used as a general term for a category of items, tasks, or issues that are not easily categorized. For example, a "misc" field in a log might contain information that doesn't fit into other predefined categories, such as a filename associated with a vulnerability.
What does the GPU do?
performing mathematical calculations at high speed, particularly for tasks related to graphics and video processing
the 5 main features of an operating system
process management, memory management, file system management, device management, and user interface.
Continuous Learning
Staying updated on evolving cyber threats and ethical considerations.
Protecting personal
Cyber security safeguards individuals and organizations from the risks of data breaches and identity theft.
What is MISC in cyber security
Management Information Security Committee, or MISC, is a management-level data protection and cybersecurity committee headed by the organization's CEO