the information we create and use when interacting with online services like apps and websites
What is data
what are the guiding principles behind information security
what is confidentiality, integrity, and availability
a point at which there is potential for a security breach
what is vulnerability
what is the first step in protecting systems from attack
what is identifying vulnerabilities
malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
what is ransomware
any information about individuals
what is personal information
the data about people and their financial records
what are the information assets
some danger that can exploit a vulnerability
what is a threat
what does the acronym IoT stand for
what is internet of things
records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware
what is spyware
what are the three pillars of cybersecurity
what is people, processes, and technology
verifying the identity of the user
what is authentication
action you take to protect your information against threats and vulnerabilities.
what is a countermeasure
what can you use to find computers connected to the internet
what is shodan
are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others, such as for sending spam emails or flooding a website with so many requests for content that the server cannot cope, called a denial-of-service attack
what are botnets
includes social media posts and private messages that we generate when interacting with websites
what is content
about ensuring that users cannot deny knowledge of sending a message or performing some online activity at some point later in time
what is non repuditation
emails that are fake and want you to click on a link to give you malware
what is phishing
is shodan legal
what is yes
someone who hacks for a protest against the government
what is a hacktivist
information about the way in which we produce data
what is user behavior
the term for malicious software
what is malware
how many unique passwords were found in january of 2019 when troy hunt published those details
what is 21 million
what are some good sources to stay up on cybersecurity news
what is government sites, news sites, technology sites, blogs, and information security companies.
someone who commits crimes over the internet
what is a cybercriminal