Learn #CyberSecurity
#cybersecurity is ongoing effort to protect networked systems connected to the Internet and to protect all of the data from unauthorized use or harm.
![](https://public.bnbstatic.com/image/pgc/202304/cc19a36a1db103be83a6db6f51af188c.jpg)
IOTs (Internet of Things) A large network of physical objects including sensors and equipment
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
![](https://public.bnbstatic.com/image/pgc/202304/d06c5f4d71f02ce56ef6c60c87c2acb6.jpg)
CIA Triad Components.
The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
![](https://public.bnbstatic.com/image/pgc/202304/b122306dcebaf4bccac6ad664358cbad.jpg)
Confidentiality also called privacy, which means that data access is restricted to authorized personnel only. Ensuring Confidentiality: Data encryption, Username ID and Password, two factor authentication (2FA), etc.
![](https://public.bnbstatic.com/image/pgc/202304/aef169fc76cc9f906b4b0c63d49d5627.jpg)
Integrity is the term that indicates accuracy, consistency, and trustworthiness of the data.
Methods to ensure integrity
File permissions
User access control
Version control
Checksums
![](https://public.bnbstatic.com/image/pgc/202304/cf57f5dc71da11072c1cba307166f690.jpg)
Availability is the term that describes the services and data being well maintained and able to be be accessed all the time. #cybersecurity #IOTs
![](https://public.bnbstatic.com/image/pgc/202304/1c65e14bbf5d11bdeb52075aae68d8bb.jpg)
Internal security threat refers to attacks originating from within an organization
![](https://public.bnbstatic.com/image/pgc/202304/ca1af18b14a446db14398334279cea17.jpg)
External security threat refers to attacks originating from outside an organization.
![](https://public.bnbstatic.com/image/pgc/202304/77ff6bee2f3b47e0d3f761891a1e450a.jpg)
White hat hacker refers to persons or organizations that break into networks or computer systems to discover weaknesses with the intention to improve the security of these systems
![](https://public.bnbstatic.com/image/pgc/202304/51b6c2b01917ab0ceed833d552a62efc.jpg)
Black hat hacker refers to persons or organizations that take advantage of any vulnerability for illegal personal, financial, or political gain
![](https://public.bnbstatic.com/image/pgc/202304/301cc62e0ff0248c884529cf68b5c93e.jpg)
Grey Hat hacker refers to person or organizations that exploit the security of a system and bring it to the attention of the owners.
![](https://public.bnbstatic.com/image/pgc/202304/6082587574c3f76cb3345f0c37e06f7c.jpg)
Organized attack refers to organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers
![](https://public.bnbstatic.com/image/pgc/202304/2d010a2f72b4c0d416319f900bcc5f52.jpg)
Cyber warfare refers to an Internet-based conflict that involves the penetration of computer systems and networks of other nations
![](https://public.bnbstatic.com/image/pgc/202304/0f07fb6fa1fe044b148cf72ced791f3e.jpg)
Stuxnet refers to a malware program designed to damage the nuclear enrichment plant of Iran, a program which is an example of a state-sponsored attack
![](https://public.bnbstatic.com/image/pgc/202304/5c7288f03995ae50be98f601db1ce7dd.jpg)
International Multilateral Partnership Against Cyber Threat (IMPACT) refers to a global partnership of world governments, industries, and academia dedicated to improving global capabilities when dealing with cyber threats
![](https://public.bnbstatic.com/image/pgc/202304/acc53f98f3678f65752698f0255ae46e.jpg)
Ethics refers to codes of behavior that are sometimes, but not always, enforced by laws
![](https://public.bnbstatic.com/image/pgc/202304/c3186d281b75110cc3910a7eae14303a.jpg)