Introduction to Information Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering key concepts in information security, focusing on terms and definitions relevant to the field.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

25 Terms

1
New cards

Information Security

Protecting data from unauthorized access and ensuring confidentiality, integrity, and availability.

2
New cards

Information Privacy

Control over personal data, emphasizing legal and ethical compliance, and protection against misuse.

3
New cards

Data Protection

Security policies and measures implemented to safeguard sensitive information like PII, financial, and health records.

4
New cards

CIA Triad

A model for information security that focuses on Confidentiality, Integrity, and Availability.

5
New cards

Confidentiality

Restricts information access to authorized users to maintain privacy.

6
New cards

Integrity

Ensures data accuracy and completeness through validation methods.

7
New cards

Availability

Guarantees access to systems and data to authorized users when needed.

8
New cards

Threats

Potential causes of incidents that may harm systems, such as malware and phishing.

9
New cards

Vulnerabilities

Weaknesses in a system that can be exploited by threats.

10
New cards

Risk

The potential for loss when threats exploit vulnerabilities.

11
New cards

Access Control

Regulates permissions, granting or denying resource access to authorized users.

12
New cards

Discretionary Access Control (DAC)

Access is granted at the discretion of the object's owner.

13
New cards

Mandatory Access Control (MAC)

Access is mandated by a central authority rather than individual users.

14
New cards

Role-Based Access Control (RBAC)

Access is based on the user's role within an organization.

15
New cards

Security Policies

Define rules for accessing, storing, and transmitting data.

16
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to systems.

17
New cards

Social Engineering

Manipulation of people to gain confidential information.

18
New cards

Penetration Testing

A simulated cyberattack to identify exploitable vulnerabilities in a system.

19
New cards

Vulnerability Scanning

Automatic identification of known system weaknesses.

20
New cards

Incident Response

Important measures taken to detect, respond to, and recover from security incidents.

21
New cards

Technical Controls

Technological security measures that protect systems and data from cyber threats.

22
New cards

Privacy Impact Assessment (PIA)

A process to evaluate and manage impacts on personal data privacy.

23
New cards

Data Subject's Rights

Rights defined for individuals concerning their personal data.

24
New cards

Personal Information Controller (PIC)

An entity responsible for controlling the collection and use of personal information.

25
New cards

Personal Information Processor (PIP)

An entity that processes personal data on behalf of the PIC.