BlackFog Logo

Cybersecurity 101

A B C D E F G H I K M N O P R S T U V W Z

CIA Triad

The CIA Triad is a foundational concept in cybersecurity that serves as a model for securing information and ensuring the integrity of systems. The acronym CIA stands for Confidentiality, Integrity, and Availability, which are considered the three core principles of information security. These principles guide the development and implementation of security policies, strategies, and [...]

2024-11-07T12:36:19+00:00July 5th, 2023|

Clickjacking

Clickjacking is a malicious technique used by cybercriminals to deceive users into interacting with something different from what they perceive on their screens. This attack typically occurs through a seemingly harmless webpage, where an invisible or disguised element is placed over a legitimate button, link, or interface. When a user clicks on what they [...]

2024-11-07T12:41:34+00:00September 21st, 2022|

Cloud

The Cloud refers to a system of delivering computing services—including storage, processing power, networking, databases, and software—over the internet, rather than from a local server or personal device. The term "cloud" is a metaphor for the internet, where data and applications are hosted on remote servers rather than being stored on a physical machine [...]

2024-11-07T12:47:00+00:00July 5th, 2023|

Consumer Data Right (CDR) Australia

The Australian Government has introduced Consumer Data Right in Australia. Consumer Data Right will give consumers, including individuals and business, a secure way to control which businesses have access to their data.

2022-09-23T21:50:15+01:00July 19th, 2022|

Cookies

Cookies are text files with small pieces of data from a website, used to identify your computer, that is stored within a web browser and can be retrieved by the website at a later time. Cookies play a key role in enhancing the user experience by remembering certain information about the user and their [...]

2024-11-07T13:42:41+00:00July 6th, 2023|

Critical National Infrastructure (CNI)

According to the National Proactive Security Authority, Critical National Infrastructure (CNI) is those critical elements of infrastructure (namely assets, facilities, systems, networks or processes and the essential workers that operate and facilitate them), the loss or compromise of which could result in: a) Major detrimental impact on the availability, integrity or delivery of essential [...]

2024-11-07T13:56:17+00:00July 5th, 2023|

Crypto Ransomware

Among the oldest, and traditionally the most common form of ransomware, crypto ransomware works by finding valuable files on a system and applying encryption to them so they become unusable.

2024-11-08T12:00:02+00:00July 26th, 2022|

Cryptography

Cryptography is the science and practice of securing communication and data through the use of mathematical algorithms and protocols. Its primary goal is to protect information from unauthorized access, ensuring confidentiality, integrity, authentication, and non-repudiation in digital communications and transactions. Cryptography has a long history, dating back thousands of years, but in the modern [...]

2024-11-08T12:30:39+00:00March 7th, 2023|

Cryptojacking

Cryptojacking is a type of cybercrime that involves a hacker co-opting a victim’s computing power to generate cryptocurrency on the attacker’s behalf. The motive for these types of attacks is profit, which is usually extremely effective as it is completely hidden from users and difficult to detect. Hackers use this method instead of having [...]

2024-11-08T12:31:25+00:00September 21st, 2022|

Cyber incident

A cyber incident is a cybersecurity event that has compromised an organization's data or systems or that has bypassed the security measures put in place.

2023-03-08T15:36:36+00:00March 8th, 2023|