The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A widely agreed upon set of rules that standardize communication between machines.
A group of two or more computer systems linked together.
Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.
A network device that allows a device to connect to the Internet.
An access point that allows for network management and security configuration.
In cyber security, a connecting point refers to any physical or logical location where a device or system connects to a network, enabling data exchange. These connecting points, also known as endpoints, are crucial entry points for cyberattacks, as threat actors can exploit vulnerabilities at these locations to gain unauthorized access to networks and data.
The usage of deceptive emails and websites to maliciously gather personal information
Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
Protection of computer systems, networks, and data from digital attacks.
Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.
An encryption method in which each letter of the message is shifted by a certain amount, called the key
The conversion of encrypted data into its original form.
the process of converting information or data, usually to prevent unauthorized access
Defines an unordered list in HTML.
defines a list item inside an HMTL list.
The <ol> tag defines an ordered list. An ordered list can be numerical or alphabetical.
Cascading Style Sheets. The language for designing web pages and adding style.
A document that can be viewed by a web browser, usually written in HTML