Pages

Monday, April 23, 2018

Cyber Security Terminology-1


Basic Terminology related to Cyber Security

Information systems: An information system (IS) is an organized system for the collection, organization, storage and communication of information.

Information management: Information management (IM) is the process of collecting, storing, managing and maintaining information in all its forms.

Security Attacks: In computer and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an Asset.

Three Basic Security Goals: The three basic security goals are confidentiality, integrity, and availability. All information security measures try to address at least one of three goals.

Computer Criminals: Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks.

Viruses: A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

It is a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Malicious Code: Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone.

System Threats: System threats refers to misuse of system services and network connections to put user in trouble. System threats can be used to launch program threats on a complete network called as program attack. System threats creates such an environment that operating system resources/ user files are misused.

Physical Security: Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.

Physical Access Control: In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. ... Locks and login credentials are two analogous mechanisms of access control.

Windows File Protection (WFP), a sub-system included in Microsoft Windows operating systems of the Windows 2000 and Windows XP era, aims to prevent programs from replacing critical Windows system files. Protecting core system files mitigates problems such as DLL hell with programs and the operating system.

Network Security: Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Intrusion Detection System: An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

Privacy on the Web/ Internet Privacy: Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet. Internet privacy is a subset of data privacy.

References: https://en.wikipedia.org


Click here to read more Cyber Security Terminology.

No comments:

Post a Comment