Principal microprocessor in a PC or mobile device responsible for running firmware, operating system, and applications software.
CPU
Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).
Hard Drive
The communication between an information processing system, such as a computer or computing device, and the outside world. The data or commands could come from a human, or from another computing device.
Input
Volatile storage devices that hold computer data and program instructions while the computer is turned on.
Random Access MEMORY (RAM)
Essential part of computer operations without it the computer wont start
this kind of memory “volatile” because it changes easily, it’s not stable (White board analgy)
Device with a persistent storage mechanism, such as hard drives, solid state drives, and optical drives.
Mass Storage
Persistent mass-storage device implemented using flash memory.
Solid State Drives (SSD)
Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).
Flash devices, such as USB flash drives and SSDs (solid state drives), store information using programmable, non-volatile flash memory.
Hard Disk Drive (HDD)
Hard disks keep data on special magnetic disks inside a protective housing to store data
Flash RAM is similar to a ROM chip in that it retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly. Flash memory is used in USB thumb drives and memory cards for removable storage and in Solid State Drives (SSDs), designed to replicate the function of hard drives.
Flash Memory
The use of computers and related devices to manage data.
Information Technology
A device connected to a computer to provide communication, such as input and output, or supplementary functions, such as additional storage.
peripheral
something outside the main computer that you can connect with a cable or
mouse, keyboard, printers, screens, and speakers are referred to as peripherals or peripheral devices
provides the basic foundation for all of the computer’s hardware including the processor, RAM, firmware, and expansion cards. Several motherboard standards are available each with a different layout and associated advantages.
Motherboard
rovides shared resources on the network and allows clients to access this information. The advantage of a server-based system is that resources can be administered and secured centrally.
Server
Software that facilitates the control and configuration of the computer device via device drivers, services, and one or more user interfaces.
Operating System (OS)
Using software and smartphone cameras or headsets to interact with real-world objects and images or change the way they appear in some way.
augmented reality
A computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone.
Virtual Reality
Devices that can report state and configuration data and be remotely managed over IP networks.
The Internet of Things (IoT)
Lightbulbs
Security cameras
Doorbells
Smart speakers
Smart TVs
Smartwatches
Home appliances
is specifically designed to handle and render the graphics of video games, making them look detailed and smooth
GPU (Graphics Processing Unit
Data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them).
Personally Identifiable information PII
Full name (first name, middle name or names, and last name)
Home address
Phone number
Social Security or National Insurance number
Email address
Bank account number
Passport number
Driver’s license number
Login credentials (a username and password combination)
Vehicle identification numbers (VINs)
Browser history
Social media posts
IP addresses
A person or entity responsible for an event that has been identified as a security incident or as a risk.
Threat Actor
The invention of fake personal information or the theft and misuse of an individual’s personal information.
Indentity Fraud
Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.
Algorithms
A text file used to store information about a user when they visit a website. Some sites use cookies to support user sessions.
Cookies
System for sending text messages between cell phones.
Short Message Service (SMS)
Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.
End-to-end encryption is a method of secure communication that prevents third parties from reading your data while it’s transferred from one system or device to another.
Encryption
Encryption uses different types of cipher and one or more keys.