Cybersecurity and Information Assurance

Expert-defined terms from the Executive Certificate in Defense Technology Innovation course at UK School of Management. Free to read, free to share, paired with a globally recognised certification pathway.

Cybersecurity and Information Assurance

Cybersecurity #

Cybersecurity

Cybersecurity refers to the practice of protecting computer systems, networks, a… #

These attacks can come in various forms, such as malware, ransomware, phishing, and denial-of-service attacks. Cybersecurity measures aim to prevent unauthorized access, data breaches, and other cyber threats.

Information Assurance #

Information Assurance

Information Assurance encompasses the protection, availability, integrity, authe… #

It involves implementing policies, procedures, and technologies to ensure that data is secure and trustworthy.

Access Control #

Access Control

Access control is the process of restricting access to resources or information… #

This can include using passwords, biometrics, smart cards, or other authentication methods to verify a user's identity before granting access.

Advanced Persistent Threat (APT) #

Advanced Persistent Threat (APT)

An Advanced Persistent Threat (APT) is a sophisticated, long #

term cyber attack in which an unauthorized user gains access to a network and remains undetected for an extended period. APTs are often carried out by nation-states or organized crime groups.

Authentication #

Authentication

Authentication is the process of verifying the identity of a user or system #

This can involve using passwords, biometrics, security tokens, or other methods to ensure that only authorized individuals have access to a system or network.

Botnet #

Botnet

A botnet is a network of infected computers or devices that are controlled by a… #

Botnets are often used to carry out distributed denial-of-service (DDoS) attacks, spam campaigns, or other malicious activities.

Cryptography #

Cryptography

Cryptography is the practice of securing communication by encoding messages to m… #

It involves using algorithms and keys to encrypt and decrypt data, ensuring confidentiality and integrity.

Data Breach #

Data Breach

A data breach occurs when sensitive or confidential information is accessed, sto… #

Data breaches can result in financial losses, reputational damage, and legal consequences for organizations.

Defense in Depth #

Defense in Depth

Defense in Depth is a cybersecurity strategy that involves implementing multiple… #

This approach aims to make it more difficult for attackers to compromise a system by adding redundancy and diversity in defenses.

Denial #

of-Service (DoS) Attack

A Denial #

of-Service (DoS) attack is a cyber attack that disrupts the normal operation of a network, system, or service by overwhelming it with a flood of traffic or requests. This can result in downtime, slow performance, or complete unavailability of the targeted resource.

Encryption #

Encryption

Encryption is the process of converting plaintext data into ciphertext to protec… #

This is done using cryptographic algorithms and keys to ensure that only authorized parties can decrypt and read the information.

Firewall #

Firewall

A firewall is a network security device or software that monitors and controls i… #

Firewalls can help prevent unauthorized access, malware infections, and other cyber threats.

Hacker #

Hacker

A hacker is an individual who uses technical skills to gain unauthorized access… #

Hackers can be classified as white hat (ethical), black hat (malicious), or gray hat (in between) based on their intentions and actions.

Incident Response #

Incident Response

Incident Response is the process of detecting, analyzing, and responding to cybe… #

This involves identifying security breaches, containing the damage, eradicating threats, and recovering affected systems to minimize the impact of an attack.

Information Security #

Information Security

Information Security focuses on protecting the confidentiality, integrity, and a… #

This includes implementing security policies, procedures, and controls to safeguard data from unauthorized access, disclosure, alteration, or destruction.

Malware #

Malware

Malware is malicious software designed to disrupt, damage, or gain unauthorized… #

Common types of malware include viruses, worms, Trojans, ransomware, spyware, and adware.

Penetration Testing #

Penetration Testing

Penetration Testing, also known as ethical hacking, is a security assessment tec… #

Penetration testers use authorized methods to exploit weaknesses and provide recommendations for remediation.

Phishing #

Phishing

Phishing is a cyber attack technique in which attackers impersonate legitimate e… #

Phishing attacks are typically carried out via email, text messages, or fake websites.

Ransomware #

Ransomware

Ransomware is a type of malware that encrypts a victim's files or locks them out… #

Ransomware attacks can cause data loss, financial damage, and operational disruptions for individuals and organizations.

Risk Management #

Risk Management

Risk Management is the process of identifying, assessing, and mitigating risks t… #

This involves analyzing threats, vulnerabilities, and potential impacts to develop strategies for minimizing the likelihood and impact of security incidents.

Social Engineering #

Social Engineering

Social Engineering is a technique used by cyber attackers to manipulate individu… #

This can involve psychological manipulation, deception, or impersonation to exploit human vulnerabilities.

Two #

Factor Authentication (2FA)

Two #

Factor Authentication (2FA) is a security mechanism that requires users to provide two different forms of identification to access a system or account. This typically involves something the user knows (password) and something the user has (security token, biometric data).

Vulnerability #

Vulnerability

A Vulnerability is a weakness or flaw in a system, network, or application that… #

Vulnerabilities can result from software bugs, misconfigurations, design flaws, or inadequate security controls.

Zero #

Day Exploit

A Zero #

Day Exploit is a cyber attack that targets a previously unknown vulnerability in software or hardware. Zero-day exploits are dangerous because they are typically used before a patch or fix is available, leaving systems vulnerable to exploitation.

May 2026 cohort · 29 days left
from £99 GBP
Enrol