Means keeping things hidden.
In I.T., it means keeping the data that you have hidden safely from unwanted eyes.
Integrity means keeping our data accurate and untampered with.
Availability means that the information we have is readily accessible to those people that should have it.
The possibility of suffering a loss in the event of an attack on the system.
A flaw in the system that could be exploited to compromise the system.
Vulnerability that is not known to the software developer or vendor,
but is known to the attacker.
Software that is used to take advantage of a security bug or vulnerability.
The possibility of danger that could exploit a vulnerability.
A hacker in the security world is someone who attempts to break into or exploit a system.
An actual attempt at causing harm to a system.
Malware is a type of malicious software that can be used to obtain your sensitive
When the program is running, it touches many files, each of which is now susceptible to being infected with the virus.
So, the virus replicates itself on these files, does the malicious work it's intended to do, and repeats this over and over until it spreads as far as it can.
Worms are similar to viruses except that instead of having to attach themselves onto something to spread, worms can live on their own and spread through channels like the network.
Adware is just software that displays advertisements and collects data.
A Trojan is malware that disguises itself as one thing but does something else.
Spyware is the type of malware that's meant to spy on you.
Which could mean monitoring your computer screens, key presses, webcams, and then reporting or streaming all of this information to another party, it's not good.
Keylogger : A keylogger is a common type of spyware that's used to record every keystroke you make.
Ransomware is a type of attack that holds your data or system hostage until you pay some sort of ransom.
Bots can utilize someone else's machine to perform a task that is centrally controlled by the attacker.
Botnets are designed to utilize the power of the Internet-connected machines to perform some distributed function.
A backdoor is a way to get into a system if the other methods to get in a system aren't allowed, it's a secret entryway for attackers.
A collection of software or tools that an admin would use.
A logic bomb is a type of Malware that's intentionally installed, after a certain event or time has triggered, it will run the malicious program.