1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information Security
_______ (often called InfoSec) is the practice of protecting information and the systems that store, process, and transmit it. The purpose is to prevent unauthorized access, disclosure, alteration, or destruction of data.
Confidentiality
_______ ensures that information is only accessible to people who have the proper authorization. Unauthorized individuals should not be able to view or steal sensitive data.
Confidentiality
Example: A hospital keeps patient medical records encrypted so that only doctors and authorized staff can access them. If hackers or unauthorized users try to open the files, the data would remain unreadable.
Integrity
________ focuses on maintaining the accuracy, consistency, and completeness of data. It prevents unauthorized changes, whether intentional (like hacking) or accidental (like human error)
Integrity
Example: In online banking, when you transfer money, integrity ensures that the transaction details are not altered by a hacker during transmission. Hashing and verification methods confirm that the data remains unchanged from sender to receiver.
Availability
_____ ensures that information and systems are accessible to authorized users whenever they need it. Even if technical failures or attacks occur, services should remain functional.
Availability
Example: An e-commerce website must be online 24/7. If its main server fails, a backup server should automatically take over so that customers can still place orders without interruption.
threat
A _____ is any potential cause of an unwanted event that could harm a system, organization, or individual. It represents “what could go wrong.”
Human-made threats
_______ – hackers, malware, phishing, insider attacks.
Natural threats
_____ – earthquakes, floods, fires, storms.
Technical threats
______ – hardware failure, software bugs, network outages.
vulnerability
A _____ is a weakness or flaw in a system that can be exploited by a threat. It is essentially a “security hole” that makes the system less secure.
risk
A ____ is the chance or probability that a threat will successfully exploit a vulnerability, leading to damage, loss, or disruption.
Risk
______ = Threat × Vulnerability × Impact
Early Era
Focus: Security was mainly physical.
Information was stored on paper documents, filing cabinets, and physical media.
Protection methods included locked rooms, safes, guards, and access restrictions.
Example: Military or government offices restricted access to sensitive files by using safes and requiring security clearance.
Mainframe Era
Large centralized mainframe computers were introduced in government, research, and businesses.
Security concerns shifted from purely physical to logical access control.
Password protection became one of the first methods of securing computer systems.
Example: Universities and corporations required login credentials to access mainframe systems.
Networking Era
Computers became connected through local area networks (LANs) and eventually wider networks.
This introduced risks such as unauthorized remote access and spreading of malicious software.
First generations of firewalls and antivirus software were developed to prevent external attacks.
Example: Worms and early viruses began spreading, showing that security had to go beyond physical locks and simple passwords.
Internet and Cybercrime Era
The rapid growth of the internet opened global access but also created global threats.
Hackers, viruses, worms, and denial-of-service (DoS) attacks became common.
Cybercrime emerged, with attackers stealing data, spreading malware, and committing fraud.
Organizations and governments responded by developing laws, standards, and security policies (such as ISO/IEC 27001, HIPAA for healthcare, and early data protection acts).
Example: The “ILOVEYOU” virus (2000) spread worldwide, infecting millions of computers and causing billions of dollars in damages.
Modern Era
Security challenges became more complex and global.
Rise of Advanced Persistent Threats (APTs), state-sponsored hacking, and organized cybercrime.
Growth of cloud computing, mobile devices, and Internet of Things (IoT) increased the attack surface.
Ransomware attacks became widespread, locking critical systems until a ransom was paid.
AI-driven attacks and automation introduced new risks but also new defense tools.
Data privacy regulations such as GDPR (Europe) and HIPAA (US healthcare) enforced stricter rules for protecting personal information.
Example: Major ransomware attacks like WannaCry (2017) affected hospitals, banks, and businesses worldwide, highlighting the importance of cybersecurity
Information security
_____- is a broad field that extends beyond just installing technical tools or software. It covers the people, processes, and technology within an organization, ensuring that information remains protected in all its forms.
Human behavior
______ is often the weakest link in security. Even the most advanced systems can be compromised if users are careless.
Employees
must be properly trained to recognize threats (such as phishing emails or social engineering).
Organizations
____ should enforce security policies, such as strong password requirements, proper handling of sensitive data, and restrictions on unauthorized software.
Security
____ also involves well-defined procedures and rules to ensure that information is managed safely
Risk management
_____ – identifying and reducing potential risks.
Incident response
_________ – how to react when a security breach happens.
Audits and compliance
______ – checking that systems follow laws, standards, and company policies.
Technical tools
_____ are essential for protecting systems and data.
Firewalls
_____ – block unauthorized network traffic
Encryption
_______ – protects data from being read if stolen.
Authentication systems
______ – verify the identity of users (e.g., biometrics, two-factor authentication)
Intrusion detection systems
_______ (IDS) – monitor and alert on suspicious activity.
Digital data
_____ – stored in databases, hard drives, servers, or cloud platforms
Physical data
________ – printed documents, ID cards, contracts, or even USB drives.
Data in transmission
_____ – information sent through networks, the internet, wireless communication, or even phone lines.