Learn #CyberSecurity

#cybersecurity is ongoing effort to protect networked systems connected to the Internet and to protect all of the data from unauthorized use or harm.

IOTs (Internet of Things) A large network of physical objects including sensors and equipment

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. 

CIA Triad Components.

The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.

 

Confidentiality also called privacy, which means that data access is restricted to authorized personnel only. Ensuring Confidentiality: Data encryption, Username ID and Password, two factor authentication (2FA), etc.

 

Integrity is the term that indicates accuracy, consistency, and trustworthiness of the data.

Methods to ensure integrity

File permissions

User access control

Version control

Checksums

 

Availability is the term that describes the services and data being well maintained and able to be be accessed all the time. #cybersecurity #IOTs

Internal security threat refers to attacks originating from within an organization

External security threat refers to attacks originating from outside an organization.

White hat hacker refers to persons or organizations that break into networks or computer systems to discover weaknesses with the intention to improve the security of these systems

Black hat hacker refers to persons or organizations that take advantage of any vulnerability for illegal personal, financial, or political gain

Grey Hat hacker refers to person or organizations that exploit the security of a system and bring it to the attention of the owners.

Organized attack refers to organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers

Cyber warfare refers to an Internet-based conflict that involves the penetration of computer systems and networks of other nations

Stuxnet refers to a malware program designed to damage the nuclear enrichment plant of Iran, a program which is an example of a state-sponsored attack

International Multilateral Partnership Against Cyber Threat (IMPACT) refers to a global partnership of world governments, industries, and academia dedicated to improving global capabilities when dealing with cyber threats

 

Ethics refers to codes of behavior that are sometimes, but not always, enforced by laws