1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Information Security
Processes and policies to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Threat
Any danger that can compromise an information system.
Vulnerability
The possibility that a system will be harmed by a threat.
Cybercrime
Illegal activities conducted over computer networks, particularly the Internet.
Social Engineering
Using social skills to manipulate legitimate employees into providing confidential information.
Tailgating
A technique where a perpetrator follows a legitimate employee into restricted areas.
Shoulder Surfing
Watching an employee's screen from behind, often in public areas.
Access Controls
Restrict unauthorized individuals from accessing information resources.
Ransomware
Blocks access to systems until payment is made.
Phishing
Deceptive tactics to acquire sensitive information through false communications.
DevOps
An extension of agile methods facilitating development and operations.
Business Continuity Plan
Guidelines to maintain operations after disruptions.
Encryption
The process of scrambling data into ciphertext to secure it.
Firewall
A security system that blocks unauthorized access to networks.
Espionage
Unauthorized access attempts to organizational information.
Audit Trail
Documented sequence of actions for transaction verification.
Alien Software
Software installed through dishonest means, such as adware and spyware.
Operational Effectiveness
Enhancing the effectiveness of internal processes.
Accountability
Determining responsibility for actions.
Ethics
Principles of right and wrong guiding actions.
Differentiation
Offering unique products or services in the market.
Cost Leadership
Producing at the lowest industry cost.
Business Processes
Activities generating value through inputs, resources, and outputs.
Robotic Process Automation (RPA)
Technology that automates tasks traditionally performed by employees.