information security part 1

5.0(2)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

security

protects systems and information from threats

2
New cards

computer security

protects computer systems from harm, theft, and unauthorized access

3
New cards

cybersecurity

defends networks, data, and devices from cyberattacks

4
New cards

network security

protects networks from intrusions

5
New cards

application security

ensures software and devices are free of threats

6
New cards

information security

protects data integrity and privacy

7
New cards

disaster recovery

plans for restoring operations after an incident

8
New cards

confidentiality

ensures only authorized access to information

9
New cards

availability

ensures data is accessible when needed

10
New cards

integrity

protects data from being altered or corrupted

11
New cards

cyber threats

malware, ransomware, phishing, and ddos attacks are common threats; insider threats, where employees misuse access, can compromise sensitive data

12
New cards

data breaches

unauthorized access to databases can lead to the exposure of confidential information

13
New cards

cloud security

vulnerabilities in _-based systems can result in data loss or theft

14
New cards

weak passwords

poor _ practices make systems susceptible to brute-force attacks

15
New cards

supply chain vulnerabilities

third-party vendors may introduce risks if their security measures are inadequate

16
New cards

malware

viruses, worms, and trojans that damage systems

17
New cards

phishing

fraudulent attempts to gain sensitive information

18
New cards

ransomware

locks data and demands payment

19
New cards

social engineering

manipulating users into providing confidential data

20
New cards

implement robust security protocols

use encryption (e.g., aes) to protect sensitive data during storage and transmission; regularly update and patch systems to fix vulnerabilities

21
New cards

deploy multi-factor authentication

strengthen access controls with mfa to minimize risks of unauthorized access

22
New cards

conduct regular security audits

perform vulnerability assessments and penetration testing to identify and mitigate risks proactively

23
New cards

train employees on security awareness

educate _ about phishing attacks, secure password practices, and safe handling of data

24
New cards

invest in incident response plans

develop a comprehensive plan to quickly respond to breaches and minimize damage

25
New cards

data collection

organizations often collect vast amounts of personal data, raising concerns about misuse

26
New cards

consent issues

users may not fully understand or agree to how their data is being used

27
New cards

iot devices

can expose sensitive data due to weak security

28
New cards

global variations

privacy regulations differ across regions, complicating compliance