BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

CIA Triad

Confidentiality, Integrity, and Availability, also known as the CIA triad, is a model designed to guide policies and processes for information security within an organization. This information is crucial to the operation of a business, with CIA segmenting three ideas into separate focal points. Confidentiality involves the efforts of an organization to keep their [...]

2023-07-05T15:13:11+01:00July 5th, 2023|

CIO

A Chief Information Officer (CIO) is the corporate executive responsible for the people, processes and technologies within a company's IT department, ensuring outcomes that support business goals are delivered.

2023-07-05T15:09:14+01:00July 5th, 2023|

Clickjacking

Clickjacking is a malicious technique during which a victim is tricked into clicking on a URL, button or clickable object other than that intended by or perceived by the user. This is done by displaying invisible pages or HTML element, via frames, on top of the page the user sees. The user will continue [...]

2022-09-23T21:50:02+01:00September 21st, 2022|

Cloud

The Cloud is a distributed collection of remote servers that host software and infrastructure, and can be accessed via an Internet connection. The Cloud allows you to store, manage and process data instead of doing everything on a local server or personal device.

2023-07-05T15:01:28+01:00July 5th, 2023|

Computer Worm

A computer worm exploits vulnerabilities in a target's security software with the aim of stealing sensitive information, creating backdoors that can be used to access the system, corrupt files and do other kinds of harm.

2023-07-05T14:59:47+01:00July 5th, 2023|

Consumer Data Right (CDR) Australia

The Australian Government has introduced Consumer Data Right in Australia. Consumer Data Right will give consumers, including individuals and business, a secure way to control which businesses have access to their data.

2022-09-23T21:50:15+01:00July 19th, 2022|

Cookies

Cookies are text files with small pieces of data from a website, used to identify your computer, that is stored within a web browser and can be retrieved by the website at a later time.

2023-07-06T08:13:51+01:00July 6th, 2023|

Critical National Infrastructure (CNI)

According to the National Proactive Security Authority, Critical National Infrastructure (CNI) is Those critical elements of infrastructure (namely assets, facilities, systems, networks or processes and the essential workers that operate and facilitate them), the loss or compromise of which could result in: a) Major detrimental impact on the availability, integrity or delivery of essential [...]

2023-07-05T15:14:35+01:00July 5th, 2023|

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2022-09-23T21:50:29+01:00July 26th, 2022|

Cryptography

In cybersecurity, cryptography is the process of protecting sensitive information from unauthorized access during storage or transmission by rendering it unreadable without a key. This means that only those for whom it is intended can read and process it.

2023-03-07T16:35:40+00:00March 7th, 2023|

Title