Week 7 (Cybersecurity) Flashcards
(6 cards)
_____ is the use of computer-based techniques to promote a political agenda or social change, often related to freedom of speech, human rights, or freedom of information.
Hacktivism
The cyber kill chain is described in 7 steps:
1. _____
2. _____
3. _____
4. _____
5. _____
6. _____ _____ _____
7. _____ _____ _____
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives
____ ____ ____ refers to the concept of having safety in mind when designing code or software.
Secure by design
______ _____ _____ refers to the concept of hardening software, hardware, and computing components. It refers to how you should lock down a system or parts of a system to prevent possible avenues of cyber attacks.
Secure by default
_____ _____ _____ focuses on ensuring the security and integrity of applications during and after deployment.
Secure by deployment
_______ across stakeholders is the key to cybersecurity.
Communications