[i] Authentication Authorization Accounting (AAA)) - (definition:: A security framework for controlling and tracking user access within a computer network) - (subject:: Information Technology
[i] Asymmetric Encryption) - (definition:: Encryption that uses two mathematically related keys, a public key for encryption and a private key for decryption) - (subject:: Cybersecurity
[i] Baiting) - (definition:: Leaving malicious physical media, like a USB drive, in a public place, hoping that the finder will insert it into a computer out of curiosity) - (subject:: Cybersecurity
[i] Availability) - (definition:: Ensuring timely and reliable access to and use of information) - (subject:: Cybersecurity
[i] Centralized Authentication) - (definition:: User accounts and credentials on a network are stored and managed in a central database or directory.) - (subject:: Cybersecurity
[i] CIA Triad) - (definition:: The three pillars of information security, confidentiality, integrity, and availability) - (subject:: Cybersecurity
[i] Confidentiality) - (definition:: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information) - (subject:: Cybersecurity
[i] Decentralized Authentication) - (definition:: Each system or device on a network maintains its own local user database and authentication mechanism.) - (subject:: Cybersecurity
[i] Decryption) - (definition:: The process of transforming unreadable encrypted data back into its original state) - (subject:: Cybersecurity
[i] Distributed Denial of Service (DDoS)) - (definition:: A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or surrounding infrastructure with a flood of internet traffic) - (subject:: Cybersecurity
[i] Exploit) - (definition:: A tool or technique used by a threat actor to take advantage of a vulnerability) - (subject:: Cybersecurity
[i] Firewall) - (definition:: A security device or software that acts as a barrier between a private network and a public internet by monitoring and controlling inbound and outbound network traffic based on a predefined set of security rules and policies) - (subject:: Cybersecurity
[i] Encryption) - (definition:: The process of converting information or data into a secret code that hides the information's true meaning) - (subject:: Cybersecurity
[i] Git) - (definition:: A distributed version control system that is used to control source code and allow for collaboration) - (subject:: Computer Science
[i] Impact) - (definition:: The extent to which a risk event affects the organization) - (subject:: Cybersecurity
[i] Integrity) - (definition:: Guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity) - (subject:: Cybersecurity
[i] Malware) - (definition:: Any unauthorized software or code that is designed to cause harm, disruption, or gain unauthorized access to a computer system or network) - (subject:: Cybersecurity
[i] Man in the Middle) - (definition:: A cyber attack where an unauthorized party intercepts and alters communication between two parties) - (subject:: Cybersecurity
[i] Network) - (definition:: A network consists of two or more devices that are linked to share resources and data with each other) - (subject:: Information Technology
[i] Password) - (definition:: A string of characters used to authenticate a user's identity, typically stored in a hashed value instead of plaintext) - (subject:: Cybersecurity
[i] Phishing) - (definition:: Fraudulent emails that appear to be from legitimate sources, attempting to trick the recipient into revealing sensitive information or performing an action) - (subject:: Cybersecurity
[i] Network Isolation) - (definition:: The process of dividing a network into discrete, logically separated segments or subnetworks) - (subject:: Cybersecurity
[i] Piggybacking) - (definition:: Unauthorized physical access by following an authorized person through a restricted entry point) - (subject:: Cybersecurity
[i] Pretexting) - (definition:: Creating a plausible pretext or scenario to convince a target to reveal sensitive information) - (subject:: Cybersecurity
[i] Script Kiddies) - (definition:: unskilled individuals using premade tools to attack systems) - (subject:: Cybersecurity
[i] Risk) - (definition:: The likelihood or probability of a loss, damage, or compromise to an organization's assets) - (subject:: Cybersecurity
[i] Social engineering) - (definition:: The use of deception tactics to manipulate people into revealing sensitive information of performing actions that compromise security) - (subject:: Cybersecurity
[i] Spam) - (definition:: Unsolicited bulk emails sent out in the hopes of getting a few recipients to click on links or attachments) - (subject:: Cybersecurity
[i] Spear Phishing) - (definition:: Targeted phishing attacks that are customized for a specific organization or individual) - (subject:: Cybersecurity
[i] Symmetric Encryption) - (definition:: Encryption that uses a single, shared key for both encryption and decryption) - (subject:: Cybersecurity
[i] Threat) - (definition:: Any circumstance or event that has the potential to adversely affect an organization's assets, such as data, systems, or personnel) - (subject:: Cybersecurity
[i] User Authentication) - (definition:: A process that verifies a user attempting to access services and applications are who they claim to be) - (subject:: Cybersecurity
[i] Vulnerability) - (definition:: A weakness in a system that can be exploited by a threat actor to gain unauthorized access or cause harm to an organization's assets.) - (subject:: Cybersecurity
[i] Whaling) - (definition:: Highly targeted phishing attacks aimed at high level executives and other privileged users) - (subject:: Cybersecurity
[i] Hash Function) - (definition:: A function whose numerical value on a data file is used to represent that file and depends on the exact contents of that file) - (subject:: Cybersecurity
[i] Nonrepudiation) - (definition:: The property of agreeing to adhere to an obligation and the inability to refute responsibility) - (subject:: Cybersecurity
[i] Version Control) - (definition:: A system that tracks every alteration to file(s) enabling users to recall earlier versions and collaborate) - (subject:: Cybersecurity
[i] Access Control) - (definition:: Process of granting or denying access to resources based on defined policies and permissions) - (subject:: Cybersecurity
[i] Discretionary Access Control) - (definition:: The owner of the resource has the discretion to determine who has access and what permissions they have) - (subject:: Cybersecurity
[i] Mandatory Access Control) - (definition:: Access is controller by a system based on predefined security policies, not the resource owner) - (subject:: Cybersecurity
[i] Access Control List (ACL)) - (definition:: A list used top define and manage access permissions like files, folders, or network devices) - (subject:: Cybersecurity
[i] Permissions) - (definition:: Alternatively called rights and privileges, access details given by a user or network administrator that define access rights to resources on a network) - (subject:: Cybersecurity
[i] Effective Permissions) - (definition:: Cumulative access rights a user has to a resource based on their individual permissions and group memberships) - (subject:: Information Technology
[i] Digital Certificates) - (definition:: An electronic file that acts as digital identification to establish trust and verify identities of a file, user, device, or website) - (subject:: Cybersecurity
[i] Public Key Infrastructure (PKI)) - (definition:: The framework of policies, procedures and technologies used to manage and distribute digital certificates) - (subject:: Cybersecurity
[i] Digital Signatures) - (definition:: Using a private and public key pair to provide proof of origin and integrity of data) - (subject:: Cybersecurity
[i] Protocols ) - (definition:: Sets of rules and formats that define how communication occurs between devices on a network) - (subject:: Cybersecurity