3)Terminologies in Cyber Security
4) What is Hacking?
TERMINOLOGIES IN CYBER SECURITY
1.Cyber attack 6.Patch
2.Cyber threats 7.Mitigation
3.Exploit 8.CAPTCHA
4.Vulnerability 9.Authentication
5.Databreach
CAPTCHA:
 A computer program or system intended to distinguish
human from machine input.
 CAPTCHA is an acronym that stands for "Completely
Automated Public Turing test to tell Computers and
Humans Apart .“
 A computer program such as a bot will be unable to
interpret the distorted letters, while a human being
can interpret them.
CYBER ATTACK:
CYBER THREATS:
A cyber attack is an assault launched
by cybercriminals using one or more computers against a
single or multiple computers or networks.
Cyber threats are malicious
attempts to cause disruptions to a computer system or
network by stealing valuable data or accessing unauthorized
files.
EXPLOIT:
VULNERABILITY:
An exploit is a piece of software, a chunk of
data, or a sequence of commands that takes advantage of a
vulnerability to cause damage.
( to use something to one’s own advantage)
Vulnerability is a weakness which
can be exploited by a threat actor, such as an attacker, to
perform unauthorized actions.
MITIGATION:
DATA BREACH:
PATCH:
Data breach is a confirmed incident in
which sensitive, confidential or protected data has been accessed
and/or disclosed in an unauthorized fashion .
• Threat Mitigation refers to the policies or
the processes used to, lessen the extent of a damage , when
security attacks happen.
A patch is a small piece of software that a company
issues whenever a security flaw is uncovered.
AUTHENTICATION
Validating or verifying an identity of a user before
allowing access.
Two phases:
 Identification
 Actual authentication
Identification – The user id you enter.
Actual authentication – password or pin
It is a security process in which users provide two different
authentication factors to verify themselves.
Two-factor authentication methods rely on a user providing
a password, as well as a second factor, usually either a
security token
 80% of data breaches can be prevented by 2FA.
 Less than 10% of users adopted 2FA over the course of over
7 years.
TWO FACTOR AUTHENTICATION
MFA: It is the most sophisticated authentication method that
uses 2 or more independent factors to grant user access to a system.
 Something you know - a password or a pin
 Something you have - mobile phone or a security
token
 Something you are - fingerprint or Face ID
 Something you do - typing speed, locational
information
MULTI FACTOR AUTHENTICATION

Cyber Security Cyberella Terminologies.pptx

  • 1.
    3)Terminologies in CyberSecurity 4) What is Hacking?
  • 2.
    TERMINOLOGIES IN CYBERSECURITY 1.Cyber attack 6.Patch 2.Cyber threats 7.Mitigation 3.Exploit 8.CAPTCHA 4.Vulnerability 9.Authentication 5.Databreach
  • 3.
    CAPTCHA:  A computerprogram or system intended to distinguish human from machine input.  CAPTCHA is an acronym that stands for "Completely Automated Public Turing test to tell Computers and Humans Apart .“  A computer program such as a bot will be unable to interpret the distorted letters, while a human being can interpret them.
  • 4.
    CYBER ATTACK: CYBER THREATS: Acyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. Cyber threats are malicious attempts to cause disruptions to a computer system or network by stealing valuable data or accessing unauthorized files.
  • 5.
    EXPLOIT: VULNERABILITY: An exploit isa piece of software, a chunk of data, or a sequence of commands that takes advantage of a vulnerability to cause damage. ( to use something to one’s own advantage) Vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions.
  • 6.
    MITIGATION: DATA BREACH: PATCH: Data breachis a confirmed incident in which sensitive, confidential or protected data has been accessed and/or disclosed in an unauthorized fashion . • Threat Mitigation refers to the policies or the processes used to, lessen the extent of a damage , when security attacks happen. A patch is a small piece of software that a company issues whenever a security flaw is uncovered.
  • 7.
    AUTHENTICATION Validating or verifyingan identity of a user before allowing access. Two phases:  Identification  Actual authentication Identification – The user id you enter. Actual authentication – password or pin
  • 8.
    It is asecurity process in which users provide two different authentication factors to verify themselves. Two-factor authentication methods rely on a user providing a password, as well as a second factor, usually either a security token  80% of data breaches can be prevented by 2FA.  Less than 10% of users adopted 2FA over the course of over 7 years. TWO FACTOR AUTHENTICATION
  • 9.
    MFA: It isthe most sophisticated authentication method that uses 2 or more independent factors to grant user access to a system.  Something you know - a password or a pin  Something you have - mobile phone or a security token  Something you are - fingerprint or Face ID  Something you do - typing speed, locational information MULTI FACTOR AUTHENTICATION