BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

Chief Information Officer (CIO)

A Chief Information Officer (CIO) is a high ranking executive responsible for overseeing an organization's information technology and information systems, ensuring they deliver outcomes that support enterprise goals.

2023-03-07T16:30:02+00:00March 7th, 2023|

Chief Information Security Officer (CISO)

A Chief Information Security Officer (CISO) is responsible for an organization's information, cyber and technology security program. A CISO develops, implements and manages policies and procedures designed to protect systems and assets from both internal and external threats.

2023-03-07T16:33:50+00:00March 7th, 2023|

Chief Technology Officer (CTO)

A Chief Technology Officer (CTO) focuses on the technological requirements, opportunities and challenges within the business, managing and driving value from technology. This role will know the short and long term needs of an organization and make investments in new technology to enable the organization to fulfil these goals.

2023-03-07T16:32:22+00:00March 7th, 2023|

CIA Triad

Confidentiality, Integrity, and Availability, also known as the CIA triad, is a model designed to guide policies and processes for information security within an organization. This information is crucial to the operation of a business, with CIA segmenting three ideas into separate focal points. Confidentiality involves the efforts of an organization to keep their [...]

2023-07-05T15:13:11+01:00July 5th, 2023|

CIO

A Chief Information Officer (CIO) is the corporate executive responsible for the people, processes and technologies within a company's IT department, ensuring outcomes that support business goals are delivered.

2023-07-05T15:09:14+01:00July 5th, 2023|

Clickjacking

Clickjacking is a malicious technique during which a victim is tricked into clicking on a URL, button or clickable object other than that intended by or perceived by the user. This is done by displaying invisible pages or HTML element, via frames, on top of the page the user sees. The user will continue [...]

2022-09-23T21:50:02+01:00September 21st, 2022|

Cloud

The Cloud is a distributed collection of remote servers that host software and infrastructure, and can be accessed via an Internet connection. The Cloud allows you to store, manage and process data instead of doing everything on a local server or personal device.

2023-07-05T15:01:28+01:00July 5th, 2023|

Computer Worm

A computer worm exploits vulnerabilities in a target's security software with the aim of stealing sensitive information, creating backdoors that can be used to access the system, corrupt files and do other kinds of harm.

2023-07-05T14:59:47+01:00July 5th, 2023|

Consumer Data Right (CDR) Australia

The Australian Government has introduced Consumer Data Right in Australia. Consumer Data Right will give consumers, including individuals and business, a secure way to control which businesses have access to their data.

2022-09-23T21:50:15+01:00July 19th, 2022|

Title