Chapter 08 — Key Terms and Definitions#

Cybersecurity — The practice of protecting systems, networks, and data from unauthorized access or attacks.

CIA Triad — The three pillars of security: confidentiality, integrity, and availability.

Risk Management — The process of identifying, assessing, and mitigating threats that could harm organizational assets.

Threat — A potential danger that could exploit a weakness and cause harm to systems or data.

Vulnerability — A weakness in technology, processes, or people that can be exploited by threats.

Malware — Malicious software such as viruses, worms, or ransomware designed to disrupt or damage systems.

Phishing — A deceptive attack tricking users into revealing sensitive information or installing malware.

Encryption — Converting data into a secure format that requires a key to access.

Multi-Factor Authentication (MFA) — A security measure requiring multiple forms of identity verification.

Business Continuity Planning (BCP) — Preparing procedures and systems to ensure organizations can operate during and after disruptions.