Software Security Lecture Week 1

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

A collection of vocabulary flashcards covering key concepts in Software Security, including definitions and important terms from the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Security

The protection of systems, data, and resources against unauthorized access, disclosure, alteration, or destruction.

2
New cards

Security Breach

An incident where unauthorized access results in the compromise of confidentiality, integrity, or availability of data.

3
New cards

Confidentiality

Non-disclosure of information, ensuring that sensitive information is only accessible to authorized individuals.

4
New cards

Integrity

Assurance that information is received as it was sent, without unintended alteration.

5
New cards

Availability

Ensures that systems are functional and available to authorized users when needed.

6
New cards

Active Attack

An attempt to alter system resources or affect their operation.

7
New cards

Passive Attack

An attack that involves monitoring or eavesdropping on transmissions without altering them.

8
New cards

Denial of Service (DoS) Attack

An attack that prevents or inhibits the normal use of communications facilities.

9
New cards

Masquerade Attack

When one entity pretends to be another to gain unauthorized access.

10
New cards

Nonrepudiation

Assurance that someone cannot deny the validity of a message they sent or received.

11
New cards

Vulnerability

A weakness or flaw in an asset or system that can be exploited by a threat.

12
New cards

Risk

The likelihood and potential impact of a threat exploiting a vulnerability.

13
New cards

Mitigation

The process of reducing the likelihood or impact of potential threats by addressing vulnerabilities.

14
New cards

Encryption

The process of transforming data into a form that is not readily intelligible, providing confidentiality.

15
New cards

Access Control

Mechanisms that limit and control access to systems and applications.

16
New cards

Threat

A potential danger that may exploit vulnerabilities in an organization's assets.

17
New cards

Ransomware

A type of malware that encrypts a user's files, demanding payment for decryption.