Kartlar: isan 3350 txst information security | Quizlet

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Internet

Global network of networks enabling communication and data transfer.

2
New cards

World Wide Web (WWW)

Application layer service on the Internet using HTTP/HTTPS for websites.

3
New cards

TCP

Transmission Control Protocol; reliable, connection-oriented communication (e.g., web browsing, email).

4
New cards

UDP

User Datagram Protocol; faster, no error checking (e.g., streaming, gaming).

5
New cards

IoT (Internet of Things)

Everyday devices connected to the Internet (e.g., smartwatches, cars, home sensors).

6
New cards

Cybersecurity

Protecting systems, networks, and data from digital attacks.

7
New cards

Data Security

Ensuring confidentiality, integrity, and availability of information.

8
New cards

Risk

Likelihood a threat will exploit a vulnerability.

9
New cards

Threat

Anything with potential to harm (hackers, malware, disasters).

10
New cards

Vulnerability

A weakness in hardware, software, or processes.

11
New cards

Information System

Combination of hardware, software, data, people, and processes.

12
New cards

Information System Security

Measures to protect an IS from unauthorized access or modification.

13
New cards

CIPA

Children’s Internet Protection Act (protects minors online in schools/libraries).

14
New cards

FERPA

Family Educational Rights & Privacy Act (protects student records).

15
New cards

SOX

Sarbanes-Oxley Act (financial reporting/accounting integrity).

16
New cards

HIPAA

Health Insurance Portability and Accountability Act (medical records privacy).

17
New cards

GLBA

Gramm-Leach-Bliley Act (financial institutions must protect customer data).

18
New cards

PCI DSS

Payment Card Industry Data Security Standard (credit card transactions).

19
New cards

Confidentiality

Prevent unauthorized disclosure (e.g., encryption, access control).

20
New cards

Integrity

Ensure data is accurate and unaltered (e.g., hashing, checksums).

21
New cards

Availability

Ensure systems are accessible when needed (e.g., redundancy, backups).

22
New cards

Uptime

Percentage of time a system is operational.

23
New cards

Downtime

Percentage of time a system is unavailable.

24
New cards

MTTF

Mean Time to Failure â€" average time until system fails.

25
New cards

MTTR

Mean Time to Repair â€" average time to fix after failure.

26
New cards

MTBF

Mean Time Between Failures â€" average time between failures.

27
New cards

RPO

Recovery Point Objective â€" maximum acceptable data loss measured in time.

28
New cards

RTO

Recovery Time Objective â€" maximum acceptable downtime after disruption.

29
New cards

User Domain

End-users; risk = weak passwords, phishing.

30
New cards

Workstation Domain

Desktops/laptops; risk = malware, unpatched OS.

31
New cards

LAN Domain

Internal networks; risk = unauthorized access, sniffing.

32
New cards

LAN-to-WAN Domain

Firewall/router zone; risk = intrusion, misconfigurations.

33
New cards

WAN Domain

Internet connections; risk = DoS, eavesdropping.

34
New cards

Remote Access Domain

VPN users; risk = credential theft.

35
New cards

System/Application Domain

Servers & apps; risk = SQL injection, misconfigured services.

36
New cards

Security Policy Framework

Defines rules and procedures for security.

37
New cards

Acceptable Use Policy (AUP)

Defines proper use of company systems.

38
New cards

Security Awareness

Training users on phishing, social engineering.

39
New cards

Asset Classification Policy

Categorize data by sensitivity.

40
New cards

Asset Management Policy

Inventory and handling of assets.

41
New cards

Asset Protection Policy

Defines how assets are protected.

42
New cards

Private Data

PII such as SSN, DOB.

43
New cards

Confidential Data

Internal business data.

44
New cards

Internal Use Only

Data limited to employees.

45
New cards

Public Data

Data open to anyone.

46
New cards

Top Secret / Secret / Confidential

Government-style sensitivity levels.

47
New cards

Drivers for IoT

Connectivity, cost reduction, sensor innovation, and demand for automation.

48
New cards

Evolution of IoT

Shift from simple connected devices to smart, integrated ecosystems.

49
New cards

IoT Impact on Humans

Health monitoring, smart homes, GPS, online banking, e-commerce, cars.

50
New cards

IoT Impact on Business

Retail, remote sensors, traffic monitoring, B2C, B2B, AaaS (Anything as a Service).

51
New cards

E-Business

Conducting business processes on the Internet.

52
New cards

E-Commerce

Buying and selling online (B2C, B2B).

53
New cards

Internet Business Challenges

Security, privacy, interoperability, compliance, infrastructure.

54
New cards

E-Business Strategy Elements

Marketing, e-customer service, payment processing, IoT integration.

55
New cards

IP Mobility

Ability of devices to move across networks without losing connectivity.

56
New cards

Mobile Node

Device moving across networks.

57
New cards

Home Agent

Keeps track of mobile node’s location.

58
New cards

Foreign Agent

Helps mobile node connect when away from home network.

59
New cards

Care of Address

Temporary IP given to mobile node.

60
New cards

Correspondent Node

System communicating with mobile node.

61
New cards

IoT Security Challenges

Weak authentication, lack of updates, vulnerable sensors.

62
New cards

IoT Privacy Challenges

Collection of personal data, location tracking.

63
New cards

IoT Interoperability Challenges

Different devices & standards unable to communicate.

64
New cards

Legal/Regulatory Compliance

Who collects data, who sells it, liability issues.

65
New cards

Risk

Likelihood that a threat will exploit a vulnerability.

66
New cards

Threat

Potential cause of harm (hacker, malware, disaster).

67
New cards

Vulnerability

Weakness in system or process.

68
New cards

Impact

Potential damage from a threat.

69
New cards

Event

Any occurrence in system operations.

70
New cards

Incident

Event that negatively impacts security.

71
New cards

Control

Safeguard to mitigate risk.

72
New cards

Countermeasure

Action to prevent or reduce risk.

73
New cards

Risk Management Process

Identify, Assess & Prioritize, Plan Response, Implement, Monitor.

74
New cards

Qualitative Risk Assessment

Uses subjective measures (high, medium, low).

75
New cards

Quantitative Risk Assessment

Uses numeric values (ALE, SLE, ARO).

76
New cards

SLE

Single Loss Expectancy = Asset Value × Exposure Factor.

77
New cards

ARO

Annualized Rate of Occurrence (expected frequency).

78
New cards

ALE

Annualized Loss Expectancy = SLE × ARO.

79
New cards

Administrative Controls

Policies, training, awareness programs.

80
New cards

Detective Controls

Identify incidents (IDS, logs).

81
New cards

Preventive Controls

Stop incidents (firewalls, encryption).

82
New cards

Corrective Controls

Fix after incidents (patches, restores).

83
New cards

Physical Security Examples

Locks, guards, CCTV, fences, biometrics.

84
New cards

Social Engineering Attacks

Phishing, vishing, smishing, tailgating, impersonation.

85
New cards

Wireless Attacks

Evil Twin, Bluesnarfing, War driving, Jamming.

86
New cards

Web App Attacks

SQL Injection, XSS, CSRF, Buffer Overflow, Directory Traversal.

87
New cards

Types of Threats

Disclosure, Alteration, Denial, Fabrication.

88
New cards

Types of Hackers

Black hat, White hat, Gray hat, Crackers.

89
New cards

Business Impact Analysis (BIA)

Identifies critical systems and impact of downtime.

90
New cards

Business Continuity Plan (BCP)

Strategy for continuing operations during disruption.

91
New cards

Disaster Recovery Plan (DRP)

Plan to restore IT systems after disaster.

92
New cards

Gap Analysis

Finding difference between current security and required security.

93
New cards

Compliance Laws

HIPAA, SOX, PCI DSS, FERPA, etc.

94
New cards

BYOD Concerns

Ownership, patch management, antivirus, privacy risks.

95
New cards

Forensics

Collecting evidence after a security event.

96
New cards

Privacy Policies

Acceptable use, user acceptance, corporate adherence.

97
New cards

Full Device Encryption

Protects data at rest on laptops/phones.

98
New cards

Remote Wipe

Allows deleting device data remotely.

99
New cards

Screen Locks

Prevents unauthorized access to idle devices.

100
New cards

Application Control

Restricts which apps can be installed/executed.