An agreed upon set of rules and permissions.
security baseline
what do the three letters stand for in CIA Triad?
Confidentiality, Integrity, and Availability.
What is cybersecurity
Protection of computer systems, networks, and data from digital attacks
What account contains the following?
Highest level of privileges
Can install programs
Change global settings
Create new users
Administrator
What is the (IOT)?
is the network of devices with the ability to connect and exchange data.
The process of securing a system’s settings and configurations to reduce vulnerabilities.
system hardening
______ is the protection of information from people who are not authorized to view it.
Confidentiality
Why do we care about Cybersecurity?
because computers store and send personal information
What account has the least amount of privileges?
guest accounts
What type of information is at the most risk of being stolen? (Must name all 6)
Names
Email Addresses
Passwords
Credit Card Numbers
Location
Pictures and Videos
Proving the identity of the user.
authentication
_______ aims at ensuring that information is protected from unauthorized or unintentional alteration.
Integrity
Cybersecurity workers are needed to build more _____ ______ and respond to threats.
secure systems
What account is a possible "setup" account?
standard account
what has shut down hospitals, influenced election outcomes, and leaked sensitive data about millions of individuals.
cyber attacks
Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.
user permissions
_______is the assurance that systems and data are accessible by authorized users when and where needed.
Availability
Using the notes in class and our class discussions what is one of the highest growing careers in America? 
cyber security
What does Authentication & Authorization do?
Authentication: WHO the user is
Authorization: what the user is allowed to access
Online fraud cases have resulted in losses totaling _____________ for victims, companies and institutions.
billions of dollars
The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.
host account
What does this statement belong to? "A secure system should guarantee that authorized users have access to information when they need it."
availability
Define Cyber?
Define Security?
Cyber-Relating to computers or computer networks
Security- Measures taken to guard against spying or destructive actions
What is a Security Audit?
Physical Security
Password Policies
Account Permissions
Automatic Updates
Block/Filter Sites
Disable Guest Account
How do we prevent cyber attacks?
(Choose any of the 4 statements)
Secure systems with firewalls and other security measures
Follow security best practices--strong passwords, multi-factor authentication
Find and fix system vulnerabilities
Respond to cyber attacks to prevent further damage