IT Security and Cybersecurity Reviewer
IT Security and Cybersecurity Reviewer
1. Fundamental Concepts
1.1. Definitions
o Ransomware: Malware that encrypts data and demands a ransom for its
release.
2. Cryptography
• Symmetric Encryption: Uses the same key for both encryption and decryption
(e.g., AES, DES).
• Asymmetric Encryption: Uses a pair of keys – public and private (e.g., RSA, ECC).
• Hashing: The process of converting data into a fixed-size string of characters, which
is typically a digest that represents the original data (e.g., SHA-256, MD5).
3. Network Security
• Firewall: A network security device that monitors and filters incoming and outgoing
network traffic.
• Intrusion Prevention System (IPS): A system that detects and prevents identified
threats.
• Virtual Private Network (VPN): A service that encrypts your internet connection
and hides your IP address.
• IPsec (Internet Protocol Security): A protocol suite for securing Internet Protocol
(IP) communications.
• Acceptable Use Policy (AUP): Defines acceptable activities and behaviors for
network and internet usage.
• Data Privacy Policy: Outlines how an organization collects, stores, and protects
personal data.
• Incident Response Plan: A set of instructions to detect, respond to, and recover
from network security incidents.
• SQL Injection: An attack that involves inserting malicious SQL queries into input
fields to manipulate a database.
• Zero-Day Exploit: An attack that occurs on the same day a weakness is discovered
in software.
• White Hat Hacker: A security professional who uses hacking skills for ethical
purposes, such as penetration testing.
• Black Hat Hacker: A hacker who violates computer security for personal gain or
malicious intent.
• Penetration Testing: A simulated cyber attack against your system to check for
vulnerabilities.
• Internet of Things (IoT) Security: Protecting IoT devices from cyber threats.
• Zero Trust Architecture: A security model that assumes all users, devices, and
systems are untrusted by default.