WEEK 2 - ITEC 100

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

-a method of protecting and controlling the risks associated with private data while it is being delivered, processed, and stored.

-primarily concerned with making sure the information system operates as required while maintaining security that authorized users may access.

Information Assurance

2
New cards

-the process of protecting data by minimizing information risks, which includes eliminating the likelihood of misuse or unauthorized access to data.

-main focus of information security is providing balanced protection against cyber attacks and hacking while maintaining CIA of data.

Information Security

3
New cards

is keeping disclosure and permitted access boundaries in place, protecting private data, and protecting individual privacy.

Confidentiality

4
New cards

comprises preventing unauthorized modification or removal and guaranteeing the authenticity and non-repudiation of data.

Integrity

5
New cards

ensures reliable access to information at the appropriate time

Availability

6
New cards

Technology brings impactful changes that can make business flourish.

Foundation of Security

7
New cards

A number of frameworks, including those from the National Institute of Standards and Technology (NIST), assist organizations in putting security measures in place and reducing risks.

Security Frameworks

8
New cards

To create safe systems, it is essential to comprehend software security design principles.

Software Security

9
New cards

Effective cybersecurity management requires an understanding of potential threats and vulnerabilities.

Threats and Vulnerabilities

10
New cards

This entails employing technologies, procedures, and policies to defend networks, systems, and data against cyberattacks.

Cybersecurity

11
New cards

Security plays a vital role in our daily lives. It is essential to protect us, our families, our homes, and our businesses. Security covers a wide variety of issues, from ensuring our physical safety and protection to securing our digital data and privacy

Importance of Security

12
New cards

CIA Triad 3

Confidentiality

Integrity

Availability

13
New cards

Foundation of Security 3

Security Frameworks

Software Security

Threats and Vulnerabilities

Cybersecurity