Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
Computer crime
Any illegal act involving the use of a computer or related devices
Cybercrime
An online or Internet-based illegal act
Types of cybercriminals
Hacker
Cracker
Script kiddie
Corporate spies
Unethical employees
Cyberextortionist
Cyberterrorist
Information transmitted over networks
Has a higher degree of security risk than information kept on an organization's premises
Malware
Programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices
Common types of malware
Adware
Ransomware
Rootkit
Spyware
Trojan horse
Virus
Worm
Botnet
A group of compromised computers or mobile devices connected to a network
Zombie
A compromised computer or device in a botnet
Denial of service attack(DoS attack)
Disrupts computer access to an Internet service
Distributed DoS attack (DDoS attack)
A type of denial of service attack
Back door
A program or set of instructions in a program that allow users to bypass security controls
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate
Firewall
Hardware and/or software that protects a network's resources from intrusion
Acceptable use policy
An organizational measure to help prevent unauthorized access and use
Disabling file and printer sharing
An organizational measure to help prevent unauthorized access and use
Access controls
Define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
Audit trail
A record of both successful and unsuccessful access attempts to a computer, device, or network
Passphrase
A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
PIN (personal identification number)
A numeric password, either assigned by a company or selected by a user, that allows access to certain computer resources
Possessed object
An item that you must possess, or carry with you, in order to gain access to a computer or computer facility
Biometric device
Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic
Two-step verification
Uses two separate methods, one after the next, to verify the identity of a user
Digital forensics
The discovery, collection, and analysis of evidence found on computers and networks
Software theft
Occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program
Software activation process
Ensures the software is not installed on more computers than legally licensed
License agreement
The right to use software
Typical conditions of a single-user license agreement
You can install the software on only one computer or device, make one copy of the software as a backup, give or sell the software to another individual but only if the software is removed from the user's computer first
You cannot install the software on a network, give copies to friends and colleagues, export the software, or rent or lease the software
Information theft
Occurs when someone steals personal or confidential information
Encryption
A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Digital signature
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Digital certificate
A notice that guarantees a user or a website is legitimate
Secure site
A website that uses encryption techniques to secure its data
Hardware theft
The act of stealing digital equipment
Hardware vandalism
Defacing or destroying digital equipment
Safeguards against hardware theft and vandalism
Physical access controls (i.e., locked doors and windows)
Alarm system
Physical security devices (i.e., cables and locks)
Devices-tracking app
Safeguards against hardware failure
Surge protector
Uninterruptible power supply (UPS)
Duplicate components or duplicate computers
Fault-tolerant computer
Backup
A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
Off-site backups
Backups stored in a location separate from the computer or mobile device site