Chapter 08 — Key Terms and Definitions#
Cybersecurity — The practice of protecting systems, networks, and data from unauthorized access or attacks.
CIA Triad — The three pillars of security: confidentiality, integrity, and availability.
Risk Management — The process of identifying, assessing, and mitigating threats that could harm organizational assets.
Threat — A potential danger that could exploit a weakness and cause harm to systems or data.
Vulnerability — A weakness in technology, processes, or people that can be exploited by threats.
Malware — Malicious software such as viruses, worms, or ransomware designed to disrupt or damage systems.
Phishing — A deceptive attack tricking users into revealing sensitive information or installing malware.
Encryption — Converting data into a secure format that requires a key to access.
Multi-Factor Authentication (MFA) — A security measure requiring multiple forms of identity verification.
Business Continuity Planning (BCP) — Preparing procedures and systems to ensure organizations can operate during and after disruptions.