Page 67 - 22.03.2021_IO1-CURRICULUM-FOR-VET-PROVIDERS_FINAL_plus-graphics
P. 67

or abusive use of a private IT environment.

               Firewall              A security tool, which may be a hardware or software solution
                                     that is used to filter network traffic.
               Hacker                A  person  who  has  knowledge  and  skill  in  analyzing  program
                                     code  or  a  computer  system,  modifying  its  functions  or

                                     operations and altering its abilities and capabilities.
               Malware               Any  code  written  for  the  specific  purpose  of  causing  harm,
                                     disclosing  information  or  otherwise  violating  the  security  or

                                     stability of a system.
               Outsider threat       The likelihood or potential that an outside entity, such as an
                                     ex-employee,  competitor  or  even an unhappy  customer,  may
                                     pose a risk to the stability or security of an organization.

               Outsourcing           The  action  of  obtaining  services  from  an  external  entity.
                                     Rather  than  performing  certain  tasks  and  internal  functions,
                                     outsourcing  enables  an  organization  to  take  advantages  of

                                     external entities that can provide services for a fee.
               Phishing              A  social  engineering  attack  that  attempts  to  collect
                                     information from victims. Phishing attacks can take place over
                                     e-mail,  text  messages,  through  social  networks  or  via  smart

                                     phone apps.
               Risk                  The process of performing a risk assessment and evaluating the
               management            responses to risk in order to mitigate or otherwise handle the

                                     identified risks.
               Threat                The  process  of  evaluating  the  actions,  events  and  behaviors
               assessment            that can cause harm to an asset or organization.
               Vulnerability         Any weakness in an asset or security protection which would

                                     allow for a threat to cause harm.

















                                                     Programme: Erasmus+
                                   Key Action: Cooperation for innovation and the exchange of good practices
                                   Action Type: Strategic Partnerships for vocational education and training
                                             Project Number: 2019-1-PL01-KA202-065209
                                                                                                        67
   62   63   64   65   66   67