Videos below are linked in the chapter slideshow.
Security Keywords:
Threats to Information (videos): Backup. Cold/Shell site, Hot site, Uninterruptible Power Supply (UPS) Redundant Array of Inexpensive Disks (RAID). Storage Area Network (SAN). A SAN presents storage devices to a host such that the storage appears to be locally attached.
Threats to Users: Virus, Worm, Trojan Horse, Phishing, Ransomware
Spyware Spyware is software that aims to gather information about a person or organization, sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.
Security Methods: Multi-factor authentication, Biometrics (white paper), Patch, Biometrics (white paper), Iris Scan, Access Controls,
Single Sign On: One password to rule them all.
Encryption: private key (symmetric cryptography) public key (asymmetric cryptography). Certificate Authority. Pretty Good Privacy (from Wikipedia)
Pubic keys are created as the product of two prime numbers. P1 X P2 = C where P1 and P2 are prime numbers and C is the public key.
Transport Layer Security: The connection is private (or secure) because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret that was negotiated at the start of the session.
In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or, formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS,[3] or HTTP over SSL.
Internet Firewall. (packet). Intrusion Detection System (like firewall it reads IP addresses).
Virtual Private Network: A VPN establishes an encrypted network from your computer (laptop) to the VPN server.
Other information not for quiz or exam.
Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses