Information Security Army ICTO
Information Security Army ICTO
Definition:
Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.
Purpose:
To ensure CIA:
Example:
Using passwords to protect email accounts.
2. Abbreviations (must-know)
Abbreviation Full Form
Vulnerability:
Weakness that can be exploited (e.g., weak password).
Purpose of knowing:
Identify and mitigate risks.
Example:
SQL injection vulnerability in a website.
4. Attacks (Types)
Type Definition Example
5. Cryptography
Definition:
The science of securing data by transforming it into unreadable form.
Purpose:
Protect confidentiality and integrity.
Types:
Type Logic Examples
Symmetric key Same key for encryption & decryption AES, DES
Examples:
7. Access Control
Definition:
Methods to control who can access data/resources.
Types:
Type Logic Example
Purpose:
Prevent unauthorized access.
Purpose:
Secure and manage who can do what.
9. Firewall
Definition:
Device/software that filters network traffic based on rules.
Purpose:
Block unauthorized access.
Types:
Purpose of studying:
Know how to protect systems.
Purpose:
Guide employees & IT to maintain security.
Example:
Policy: “All passwords must be 8+ characters.”
Types:
Steps:
1. Identify
3. Mitigation
4. Monitor
Example:
Install firewall to reduce hacking risk.
Types:
Purpose:
Secure data over public internet.
Example:
Remote worker connecting to office network.
Purpose:
Enable secure communication.
Example:
Websites using HTTPS have certificates issued by CAs.
18. Digital Certificate
Definition:
Electronic document proving ownership of public key.
Example:
SSL certificate on “https://www.amazon.com”.
Logic:
Know how to protect: e.g., rate limiting, firewalls.
Purpose Ethical testing Illegal hacking Mix: may break law to fix
To remember easily: