CyberSecurity Timeline

By adam_a
  • Cybersecurity

  • Period: to

    Cybersecurity

  • Weekly Quiz 1

    1. white-hat hackers and black-hat hackers
    2. BYOD = Bring your own device, used to prevent potential harm to company devices
    3. algorithm attacks force computers to use memory or overwork CPU
  • Weekly Quiz 2

    1. ensure system availability - up-to-date OS systems, equipment maintenance
    2. 3 types of sensitive information- PII, classified, business
    3. VPN virtual network that uses the public network
  • Weekly Quiz 3

    1. indicators of spam mail- misspelled words, punctuation errors
    2. rootkit modifies the operating system
    3. software to obtain information from user computer- spyware