IT SECURITY

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

IT

includes computers and everything that can be done with them.

2
New cards

IT Security

is focused on protecting these computers, networks, and other digital systems against cyberattacks and other threats.

3
New cards

confidentiality

Protecting the privacy of data

4
New cards

Integrity

Ensuring that data has not been modified

5
New cards

availability

Providing continual access to data and systems

6
New cards

IT security

deals with all aspects of protecting IT assets against cyber threats.

7
New cards

identity security

includes methods and processes to identify, verify and authorize machines, devices, users, groups, applications, and functions

8
New cards

network security

involves securing on- prem networks, wide area networks (WAN), and the Internet

9
New cards

cloud security

As organizations increasingly adopt cloud technologies, they need cloud-specific security solutions

10
New cards

endpoint security

As employees increasingly work from home, endpoint security is more important than ever.

11
New cards

application and API security

Applications and application programming interfaces (APIs) are a major part of an organization’s attack surface and should be secured via code review, analysis and runtime analytics.

12
New cards

management

eploying an array of security solutions means that organizations need to manage them as well

13
New cards

Visibility And Incident Response

The goal of IT security is to protect the organization against cyber threats.

14
New cards

Vulnerability Exploitation

IT assets commonly run software that contains potentially exploitable vulnerabilities.

15
New cards

account takeover

Cybercriminals can steal account credentials via phishing and other social engineering attacks

16
New cards

financially motivated attacks

Cybercrime is a business with many opportunities to make money

17
New cards

Advanced persistent threats or APTs

are sophisticated threat actors financed by nation-states or organized crime.

18
New cards

poor security practices

Lax security configurations and access controls are a common problem in both on- prem and cloud-based environments.