Detailed Definitions of Key Terms in Cybersecurity Field

Verified

Added on  2023/05/27

|5
|1404
|493
Homework Assignment
AI Summary
This assignment provides a comprehensive overview of essential cybersecurity terms and definitions. It begins by defining security and cybersecurity, highlighting the importance of protecting data from hackers and cyber threats. Key terms such as threat, breach, abuse, and vulnerability are explained in detail, clarifying the risks and weaknesses in computer systems. The assignment also covers encryption techniques, including the use of private and public keys to secure data. Furthermore, it discusses various types of cybercrimes like DDOS attacks and ransomware, as well as malware such as viruses and worms. Definitions of cipher, coding, and encoding are also provided, enhancing understanding of the technical aspects of cybersecurity. This resource is valuable for students seeking to grasp the fundamental concepts in cybersecurity and is available on Desklib, a platform offering a wide range of solved assignments and study tools.
Document Page
SECURITY
0
Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY
1
Security: security is defined as an approach which is used to protect data or
information from hackers. It is state of being free from the cyber-threats and protects
personal data. It refers to the measures which are taken to protect a place, data, devices
and many more (Wei et al., 2014).
Cybersecurity: term cybersecurity is defined as a set of techniques used to
secure computer networks, hardware, from hackers or unauthentic servers. This
process provides a platform to protect personal data or information from hackers and
cyber-attacks and many consumers use this step to improve the performance of their
computer devices (Von Solms, & Van Niekerk, 2013).
Threat: it is defined as a statement of an intention to inflict damage, injury and
in the field of information technology it refers as a security issue due to which
consumers can lose their personal data (Crawford, 2017).
Breach: the term breach refers as a security incident in which the protected,
secured and confidential data or information are copied, transferred and used by an
unauthentic person. Generally, it is used by hackers to encrypt the personal information
of consumer and copy into other computer devices (Black, 2013).
Abuse: it is the improper utilization of an entity, often to unfairly and it can come
into different kinds of forms, for example, injury, physical maltreatment, violation, and
crimes. To use something for wrong determination in a mode which is very harmful is
called as abuse (Lowry, Posey, Bennett & Roberts, 2015).
Vulnerability: it is a part of cyber security which refers to a flaw in a device or
system that can leave it open to attack or crime (Cianfrani, Broennimann, Loy, & Guisan,
2018). It is also defined as a kind of weakness in computer networks and devices which
leaves data security exposed to a threat and issue.
Encryption: It is a kind of technique that encodes the message or information in
an effective manger which can access by the only authentic person. Generally, this type
of process is used in communication to improve the security of consumer data or
information which is transferred from one location to another. In which there are two
types of keys uses for example, private key and public key. In encryption technique
Document Page
SECURITY
2
private key is used that secure human personal data files from hackers and public key is
used by hackers to decrypt user’s data (Li, Yu, Zheng, Ren & Lou, 2013).
Cybercrime: term cybercrime refer as a crime in which the computing device is
the object of the crime which uses malware to hack the personal data or information of
consumers. There are different types of cyber crimes occur in a computer system, for
example, DDOS attack, ransomware, wanna cry, phishing and spamming (Lusthaus,
2013).
Viruses: it is a small infection which replicates only inside the living cells of
another organism and it has potential to effects and reduces the performance of
computer devices (Yang & Yang, 2014).
Worms: it is defined as a malware computer code that replicates itself in order
to spread from one computer to another and mainly it is used by attackers to hack the
personal information of consumers (Mishra & Ansari, 2012).
Malware: it is a kind of software which is designed to damage the computer
networks, servers and other peripheral devices of the consumer (Shabtai, Kanonov,
Elovici, Glezer & Weiss, 2012).
Cipher: it is a computer program which is used to perform encryption and
decryption processes (Klinc, Hazay, Jagmohan, Krawczyk & Rabin, 2012).
Coding: it is a primary method that provides a way to interconnect human and
machine by using computer programming (Gao, Tsang & Chia, 2013).
Encoding: it is defined as a process which is used to convert an information or
data into a coded form. Mainly, it is used in a communication system to improve the
efficiency of the transmitted signal or information (Kapur, Craik, Tulving, Wilson, Houle,
& Brown, 2016).
Document Page
SECURITY
3
References
Black, J. (2013). Developments in data security breach liability. The Business
Lawyer, 69(1), 199-207.
Cianfrani, C., Broennimann, O., Loy, A., & Guisan, A. (2018). More than range exposure:
Global otter vulnerability to climate change. Biological Conservation, 221(2), 103-
113.
Crawford, J. T. (2017). Are conservatives more sensitive to threat than liberals? It
depends on how we define threat and conservatism. Social cognition, 35(4), 354-
373.
Gao, S., Tsang, I. W. H., & Chia, L. T. (2013). Laplacian sparse coding, hypergraph
laplacian sparse coding, and applications. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 35(1), 92-104.
Kapur, S., Craik, F. I., Tulving, E., Wilson, A. A., Houle, S., & Brown, G. M. (2016). 12
Neuroanatomical Correlates of Encoding in Episodic Memory. Memory, Attention,
and Aging: Selected Works of Fergus IM Craik, 12(2, 251.
Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H., & Rabin, T. (2012). On compression of
data encrypted with block ciphers. IEEE transactions on information
theory, 58(11), 6989-7001.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal
health records in cloud computing using attribute-based encryption. IEEE
transactions on parallel and distributed systems, 24(1), 131-143.
Lowry, P. B., Posey, C., Bennett, R. B. J., & Roberts, T. L. (2015). Leveraging fairness and
reactance theories to deter reactive computer abuse following enhanced
organisational information security policies: An empirical study of the influence
of counterfactual reasoning and organisational trust. Information Systems
Journal, 25(3), 193-273.
Lusthaus, J. (2013). How organised is organised cybercrime?. Global Crime, 14(1), 52-60.
Mishra, B. K., & Ansari, G. M. (2012). Differential Epidemic Model of Virus and Worms in
Computer Network. IJ Network security, 14(3), 149-155.
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2012). “Andromaly”: a
behavioral malware detection framework for android devices. Journal of
Intelligent Information Systems, 38(1), 161-190.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY
4
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38(2), 97-102.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information
Sciences, 258, 371-386.
Yang, L. X., & Yang, X. (2014). The spread of computer viruses over a reduced scale-free
network. Physica A: Statistical Mechanics and Its Applications, 396, 173-184.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]