Learn #CyberSecurity
#cybersecurity is ongoing effort to protect networked systems connected to the Internet and to protect all of the data from unauthorized use or harm.
IOTs (Internet of Things) A large network of physical objects including sensors and equipment
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
CIA Triad Components.
The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
Confidentiality also called privacy, which means that data access is restricted to authorized personnel only. Ensuring Confidentiality: Data encryption, Username ID and Password, two factor authentication (2FA), etc.
Integrity is the term that indicates accuracy, consistency, and trustworthiness of the data.
Methods to ensure integrity
File permissions
User access control
Version control
Checksums
Availability is the term that describes the services and data being well maintained and able to be be accessed all the time. #cybersecurity #IOTs
Internal security threat refers to attacks originating from within an organization
External security threat refers to attacks originating from outside an organization.
White hat hacker refers to persons or organizations that break into networks or computer systems to discover weaknesses with the intention to improve the security of these systems
Black hat hacker refers to persons or organizations that take advantage of any vulnerability for illegal personal, financial, or political gain
Grey Hat hacker refers to person or organizations that exploit the security of a system and bring it to the attention of the owners.
Organized attack refers to organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers
Cyber warfare refers to an Internet-based conflict that involves the penetration of computer systems and networks of other nations
Stuxnet refers to a malware program designed to damage the nuclear enrichment plant of Iran, a program which is an example of a state-sponsored attack
International Multilateral Partnership Against Cyber Threat (IMPACT) refers to a global partnership of world governments, industries, and academia dedicated to improving global capabilities when dealing with cyber threats
Ethics refers to codes of behavior that are sometimes, but not always, enforced by laws