Software Security Lecture Week 1

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

A collection of vocabulary flashcards covering key concepts in Software Security, including definitions and important terms from the lecture.

Last updated 10:52 PM on 4/7/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Security

The protection of systems, data, and resources against unauthorized access, disclosure, alteration, or destruction.

2
New cards

Security Breach

An incident where unauthorized access results in the compromise of confidentiality, integrity, or availability of data.

3
New cards

Confidentiality

Non-disclosure of information, ensuring that sensitive information is only accessible to authorized individuals.

4
New cards

Integrity

Assurance that information is received as it was sent, without unintended alteration.

5
New cards

Availability

Ensures that systems are functional and available to authorized users when needed.

6
New cards

Active Attack

An attempt to alter system resources or affect their operation.

7
New cards

Passive Attack

An attack that involves monitoring or eavesdropping on transmissions without altering them.

8
New cards

Denial of Service (DoS) Attack

An attack that prevents or inhibits the normal use of communications facilities.

9
New cards

Masquerade Attack

When one entity pretends to be another to gain unauthorized access.

10
New cards

Nonrepudiation

Assurance that someone cannot deny the validity of a message they sent or received.

11
New cards

Vulnerability

A weakness or flaw in an asset or system that can be exploited by a threat.

12
New cards

Risk

The likelihood and potential impact of a threat exploiting a vulnerability.

13
New cards

Mitigation

The process of reducing the likelihood or impact of potential threats by addressing vulnerabilities.

14
New cards

Encryption

The process of transforming data into a form that is not readily intelligible, providing confidentiality.

15
New cards

Access Control

Mechanisms that limit and control access to systems and applications.

16
New cards

Threat

A potential danger that may exploit vulnerabilities in an organization's assets.

17
New cards

Ransomware

A type of malware that encrypts a user's files, demanding payment for decryption.