Information Systems & Security Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts, definitions, and principles related to Information Systems and Security as discussed in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

CIA Security Model

A guiding model in information security focusing on Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

Protecting sensitive information from unauthorized disclosure through techniques like encryption and access controls.

3
New cards

Integrity

Ensuring that information is not tampered with or modified in an unauthorized way.

4
New cards

Availability

Ensuring that information and systems are accessible to authorized users when needed.

5
New cards

Computer Security

The protection of computer systems and information from harm, theft, and unauthorized use.

6
New cards

Cyber Espionage

The act of spying to steal confidential information, particularly in the context of digital or networked environments.

7
New cards

Privacy

The rights individuals have to control their personal information and how it is used.

8
New cards

Software Piracy

The illegal duplication and distribution of software.

9
New cards

Denial of Service

Threats that render a system inoperative or limit its capability to operate.

10
New cards

Social Engineering

A technique used to trick individuals into giving out security information.

11
New cards

Ethics in Computer Crime

A set of moral principles guiding behavior in the field of computing.

12
New cards

Preventive Controls

Measures taken to stop or limit security threats.

13
New cards

Detective Controls

Measures used to find or discover security threats.

14
New cards

Corrective Controls

Actions taken to repair damages after a security incident has occurred.

15
New cards

Intellectual Property

Legal rights that give creators exclusive rights to their creations.

16
New cards

Computer Ethics

A code of conduct that binds professionals to behave ethically within the field.

17
New cards

Three Layers of Security

Physical security- like actual gates and guards and shit

logical (technical) security-password, encryption, firewalls

administrative security - laws and policies

measures used to protect information.

18
New cards

Data Breaches

Incidents where unauthorized access to data occurs, leading to exposure of sensitive information.

19
New cards

What is the purpose of software updates?

Software updates often include security patches that fix vulnerabilities, preventing potential exploits by cybercriminals.

20
New cards

Information security

preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

21
New cards

IT Security

Information Technology Security (IT Security): The methods, tools and personnel used to defend an organization's digital assets.

22
New cards

Security vs Privacy

Security is how your personal info is protected

Privacy is the right you have to control your information and how its used

23
New cards

CIA components

Confidentiality- protecting sensitive info from unauthorized beings

Integrity -protecting the data so it doesn’t get manipulated.

Availability -information made available only when needed.

24
New cards

Confidentiality techniques used

•encryption, access controls, and data masking.

25
New cards

How to keep intergrity of info

OTP’s and Digital signatures

26
New cards

Making sure info is avalable only when its neeeded

Load balancing, redundancy, distater recovery plans.

27
New cards

Layers of security (securing data through many gates)

  1. Security measueres - ie Data access policies and controls (like least privellege )

  2. Protet the device that stores the data - protect hardware/software

  3. Protect the network the computers use like using firewalls (protects against unauthorized access)

28
New cards