IT Security Foundations Core Concepts - Rian010/Journal GitHub Wiki

  1. Core Security Principles

  2. Understanding Malware

  3. Breaching Your System

  4. Investigating Internet Security

  5. Mobile and Wireless Security

  6. Secure Devices and Applications


Risk

A function of a threat exploiting a vulnerability according to a formula: Risk = Threat X Vulnerability


Threat

Anything that can exploit a vulnerability, either Intentionally or accidentally, and can range from innocent mistakes made by employees to natural disasters, which in general are difficult to control


Vulnerability

A security flaw or weakness in a system that can be exploited by threats in order to gain unauthorized access to an asset, and can include unpatched systems, human error, or software flaws


Virus

A malicious program that can alter the integrity of a system. The results can be as simple as a new icon on the desktop or more serious results such as disabling antivirus or destroying files


Worm

Self-replicating malware that can spread through the network without any help from a transport agent


Spyware

Tracks information on a user's viewing habits while on the internet, and then sends that information to a remote computer without the user's knowledge


Trojan

A program that appears to be innocent but has been designed to cause some malicious activity, or provide a backdoor to your system


Zero-day vulnerability

Occurs when a malicious actor takes advantage of a software vulnerability that is unknown or undisclosed by the software vendor


Rootkit

A collection of programs that can infiltrate a computer system, create a backdoor and remain undetected, which can allow a hacker to take administrator level control of the victim's computer


Cookies

Small text files used by most major websites to store state information to preserve information about preferences and sign-in information


Confidentiality

The promise of keeping private information private by preventing unauthorized access


WI-FI protected access (WPA)

An encryption method used to secure wireless transmissions. As of 2018, WPA3 provides the most robust protection and is the preferred standard


Asymmetric Encryption

Asymmetric Encryption is one of the two main types of encryption. It is also called Public Key encryption uses two keys, a public key and a private key, which are mathematically related


Symmetric Encryption

Symmetric encryption is one of the two main types of encryption. It is also called conventional encryption and uses a single, shared, secret key


Integrity

Protecting data from unauthorized modification