Cybersecurity Basics
Threats and Attacks
CIA Triad
Information Security
GRC
100

This is the process of verifying the identity of a user, device, or system.

Authentication

100

This is a type of malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

100

This is the principle that states that information should only be accessible to authorized individuals or entities.

Confidentiality

100

This is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

 Information security

100

This refers to the policies, procedures, and oversight mechanisms that ensure the effective management of an organization's security posture.

Governance

200

This is a type of security control that is designed to prevent unauthorized access to a system or network.

Access control

200

This is a type of attack where an attacker attempts to guess or steal login credentials to gain unauthorized access to a system.

 Brute-force attack

200

This is the principle that ensures data is accurate, complete, and reliable throughout its entire lifecycle.

Integrity

200

This is a word or phrase that verifies that you and only you had access to the account.

Password

200

This is the process of identifying, assessing, and mitigating risks to an organization's assets and operations.

Risk management

300

This is the process of protecting data from unauthorized access or modification during transmission.

Encryption

300

This is a type of attack where an attacker impersonates a legitimate user or entity to gain access to sensitive information or resources.

Identity theft

300

This is the principle that guarantees information and resources are accessible to authorized users when needed.

Availability

300

These are the technical, administrative, and physical measures designed to protect against security threats.

Security controls

300

This is the adherence to relevant laws, regulations, and industry standards related to information security.

Compliance

400

This is the process of identifying and responding to a security incident or breach.

Incident response

400

This is a type of attack where an attacker attempts to overwhelm a system or network with traffic, causing it to become unavailable to legitimate users.

Denial-of-service (DoS) attack

400

This is the process of educating and training users on security best practices.

Security awareness and training

500

This software is designed to protect against malicious code by scanning files and programs.

Antivirus software

500

This is a type of malware that encrypts a victim's files and demands a ransom payment to restore access.

Ransomware

M
e
n
u