Posted by Anonymous (not verified) on 14 Dec 2017

As in any technical discipline, cybersecurity students learn to master the tools and resources needed for the work they do.

A cybersecurity student practices his skills.They also become familiar with the terminology used by cybersecurity professionals in the field. Are you interested in studying to become a “white hat hacker” and use your skills to conduct authorized exploits against networks and systems? As a cybersecurity student at Capitol Technology University, a DHS and NSA-designated Center for Academic Excellence, you’ll find out how. And you’ll also become conversant with the terms below.

Confidentiality, Integrity, and Availability. The “CIA Triad,” not to be confused with the Central Intelligence Agency, constitutes the benchmarks that all cybersecurity initiatives measure themselves by. Confidentiality means that only authorized users have access to information. Integrity means that information is accurate and complete. Availability means that authorizers have, in fact, the ability to access the information.

McCumber Cube. Organizations are complex, as are their information needs and security goals. A cybersecurity framework developed by John McCumber in 1991 uses a Rubik’s Cube as a way of conceptualizing this complexity and identifying the many factors involved. The cube brings together desired goals (confidentiality, integrity, and availability), information states (storage, transmission, and processing), and safeguards (policies and practices, human factors, and technology).

Defense in Depth. Also dubbed the “Castle Approach,” defense-in-depth refers to the strategy of creating security controls at multiple levels throughout an IT system. In doing so, should any one security control fail, others will continue to provide protection.

Penetration testing. To identify possible weaknesses, organizations sometimes authorize cybersecurity professionals to launch attacks on computer systems with the goal of uncovering security holes. This kind of authorized intrusion is sometimes colloquially known as “white hat hacking.”

Zero Day Attack. Sometimes cyber adversaries will find out about a software flaw before the maker or vendor of that software becomes aware of the problem. They will then hurry to take advantage of the vulnerability before it is discovered and fixed. Such scenarios – which can include planting malware or accessing sensitive data -- are known as a “zero day attack.”

Capitol offers cyberecurity degree programs at the undergraduate, graduate, and doctoral levels. Want to learn more about the cybersecurity field and available educational opportunities? Contact the Admissions Office today,

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
3 + 4 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.