Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
Information Security: Module 1
Studied by 0 people
0.0
(0)
Add a rating
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 109
There's no tags or description
Looks like no one added any tags here yet for you.
110 Terms
View all (110)
Star these 110
1
Information Security
Strategies to protect digital and non-digital information.
New cards
2
Information Assurance
Ensuring information's integrity, availability, and confidentiality.
New cards
3
Threats
Potential causes of unwanted incidents affecting information.
New cards
4
Vulnerabilities
Weaknesses in a system that can be exploited.
New cards
5
Attacks
Deliberate attempts to compromise information security.
New cards
6
Controls
Measures implemented to mitigate risks to information.
New cards
7
Risk Management Process
Systematic approach to identifying and managing risks.
New cards
8
Morris Worm
First internet worm, infected 10% of systems in 1988.
New cards
9
Infosec
Short for Information Security, focuses on protecting data.
New cards
10
Unauthorized Access
Accessing information without permission or authorization.
New cards
11
Hacking
Illegally exploiting computer systems or networks.
New cards
12
Malware Attacks
Malicious software designed to harm or exploit systems.
New cards
13
Phishing
Fraudulent attempts to obtain sensitive information online.
New cards
14
Exploiting Software Vulnerabilities
Taking advantage of weaknesses in software for unauthorized access.
New cards
15
Confidentiality
Ensuring information is accessible only to authorized users.
New cards
16
Integrity
Maintaining accuracy and consistency of data over its lifecycle.
New cards
17
Availability
Ensuring information is accessible when needed.
New cards
18
Information Technology
Use of computers and software to manage information.
New cards
19
Sensitive Data
Information that must be protected from unauthorized access.
New cards
20
Cybercrime
Criminal activities conducted via the internet.
New cards
21
Physical Computing Infrastructure
Hardware and physical components supporting computing systems.
New cards
22
Information Security Certifications
Credentials validating expertise in information security practices.
New cards
23
Data Security
Protection of data from unauthorized access or loss.
New cards
24
Confidentiality
Ensures unauthorized access to information is prevented.
New cards
25
Integrity
Preserves accuracy and trustworthiness of data.
New cards
26
Availability
Ensures data is accessible for authorized users.
New cards
27
CIA Triad
Framework of confidentiality, integrity, and availability goals.
New cards
28
Information Security Principles
Guidelines to enhance organizational data protection.
New cards
29
Absolute Security
Concept that no security system is completely impenetrable.
New cards
30
Denial of Service (DoS)
Attack preventing legitimate access to services or data.
New cards
31
Confidentiality Controls
Measures like user IDs and passwords to protect data.
New cards
32
Disaster Recovery Plan
Strategy to maintain operations after a disaster.
New cards
33
Testing Software
Custom tools to evaluate network security effectiveness.
New cards
34
Governance Models
Policies and procedures for information security management.
New cards
35
Natural Disasters
Events like floods or earthquakes affecting data availability.
New cards
36
Human Actions
Intentional activities that can disrupt data access.
New cards
37
Equipment Failures
Malfunctions during normal use impacting data availability.
New cards
38
Encryption
Encoding information to protect it during transmission.
New cards
39
Unauthorized Personnel
Individuals without permission to access sensitive information.
New cards
40
Accidental Disclosure
Unintentional release of sensitive information.
New cards
41
User IDs
Unique identifiers for individuals accessing a system.
New cards
42
Passwords
Secret words or phrases for user authentication.
New cards
43
Security Goals
Objectives guiding the protection of information systems.
New cards
44
Information System Capabilities
Functional aspects of systems that must remain operational.
New cards
45
Defense in Depth
Layered security strategy to protect systems.
New cards
46
Security Layers
Multiple protective measures against attacks.
New cards
47
Intrusion Detection Systems (IDS)
Monitors network for suspicious activities.
New cards
48
Functional Requirements
Specifications of what a system should do.
New cards
49
Assurance Requirements
Standards for implementing and testing functions.
New cards
50
Identity Theft
Unauthorized use of someone's personal information.
New cards
51
Verification Testing
Checks if a system meets functional specifications.
New cards
52
Validation Testing
Confirms system performance under real-world conditions.
New cards
53
Traffic Analyzers
Tools for monitoring and analyzing network traffic.
New cards
54
Human Monitors
Personnel observing network for anomalies.
New cards
55
Automated Mechanisms
Systems that respond to detected intrusions automatically.
New cards
56
Security Decisions
Choices made regarding the protection of assets.
New cards
57
Malicious Attackers
Individuals attempting to exploit system vulnerabilities.
New cards
58
COTS Software
Commercial off-the-shelf software products.
New cards
59
Stress Tests
Evaluates system performance under extreme conditions.
New cards
60
Car Safety Testing
Evaluates vehicle safety features and performance.
New cards
61
Password Security
Protection of user credentials from unauthorized access.
New cards
62
Anomalies Detection
Identifying unusual patterns indicating potential breaches.
New cards
63
Security Vulnerabilities
Weaknesses that can be exploited by attackers.
New cards
64
Credentials
User information used for authentication purposes.
New cards
65
Probing
Gently questioning to extract sensitive information.
New cards
66
Security Layers' Strengths
Benefits of multiple defenses compensating for weaknesses.
New cards
67
Security through Obscurity
Hiding security details is insufficient for protection.
New cards
68
False Sense of Security
Obscuring security can lead to overconfidence in safety.
New cards
69
Defense in Depth
Multiple security mechanisms protect data and resources.
New cards
70
Intrinsic Value
Asset's worth determines the level of security investment.
New cards
71
Risk Management
Balancing risk level with resource expenditure for security.
New cards
72
Risk Analysis
Evaluating risks to determine appropriate security measures.
New cards
73
Risk Mitigation
Implementing measures to reduce identified risks.
New cards
74
Risk Acceptance
Acknowledging risks and managing their consequences.
New cards
75
Extreme Risk
Immediate action required to address critical threats.
New cards
76
High Risk
Requires attention from senior management for resolution.
New cards
77
Moderate Risk
Management responsibilities must be clearly defined.
New cards
78
Low Risk
Handled through routine management procedures.
New cards
79
Vulnerability
Known weaknesses within a system or program.
New cards
80
Exploit
A method to take advantage of a vulnerability.
New cards
81
Attacker
Individual with skill and intent to compromise systems.
New cards
82
Buffer Overflow
Common vulnerability where data exceeds allocated memory.
New cards
83
Economic Value
Assessing asset worth to prioritize security measures.
New cards
84
Insurance in Security
Protection against potential losses from security breaches.
New cards
85
Security Mechanism
Tools or processes designed to protect systems.
New cards
86
Consequences Management
Handling outcomes of accepted risks effectively.
New cards
87
Security Specifications
Detailed descriptions of security functions and protocols.
New cards
88
Trusted Individuals
People granted access to sensitive security information.
New cards
89
Risk Analysis
Evaluating potential threats to a system.
New cards
90
Attacker Profile
Identifying potential attackers and their capabilities.
New cards
91
Vulnerability Exploits
Availability of methods to exploit system weaknesses.
New cards
92
Intrinsic Value
Actual worth of an asset being protected.
New cards
93
Security Investment
Balancing cost of security against asset value.
New cards
94
Security Controls
Measures to prevent, detect, and respond to threats.
New cards
95
Preventative Controls
Measures to prevent unauthorized access or actions.
New cards
96
Detective Controls
Systems that identify and alert unusual activities.
New cards
97
Responsive Controls
Actions taken in response to detected security incidents.
New cards
98
Complexity in Security
Increased complexity makes systems harder to secure.
New cards
99
Fear, Uncertainty, Doubt (FUD)
Ineffective tactic for selling security solutions.
New cards
100
Justification of Security Spending
Need for solid rationale for security investments.
New cards
Load more
Explore top notes
Basic Genetic Mechanisms
Note
Studied by 1 person
808 days ago
5.0
(1)
Preview
📘
SS STUDY GUIDE
Note
Studied by 16 people
847 days ago
5.0
(1)
Preview
Chapter 12: The Federal Republic of Nigeria
Note
Studied by 30 people
704 days ago
5.0
(1)
Preview
Home, Town, and Shopping in German
Note
Studied by 54 people
185 days ago
5.0
(1)
Preview
AP Bio Unit 1 (properties of water)
Note
Studied by 181 people
919 days ago
5.0
(2)
Preview
Computational Thinking
Note
Studied by 35 people
243 days ago
5.0
(1)
Preview
Landmark Civil Rights Milestones to Know for AP US History
Note
Studied by 3 people
51 days ago
5.0
(1)
Preview
Chapter 10: Sustaining Terrestrial Biodiversity: The Ecosystem Approach
Note
Studied by 21 people
612 days ago
5.0
(1)
Preview
Explore top flashcards
MARK 410 Exam 1
Flashcard (59)
Studied by 3 people
147 days ago
5.0
(1)
Preview
Forensics Ch 1 - Intro to law
Flashcard (35)
Studied by 10 people
549 days ago
5.0
(1)
Preview
German A1
Flashcard (415)
Studied by 6 people
631 days ago
4.0
(2)
Preview
Meiosis, Gametogenesis, and Genetics
Flashcard (30)
Studied by 5 people
701 days ago
5.0
(1)
Preview
Systems Thinking MIDTERM
Flashcard (104)
Studied by 117 people
371 days ago
5.0
(1)
Preview
1.3 Vocabulaire: Grands-parents, parents et enfants: soucis et problèmes
Flashcard (30)
Studied by 29 people
423 days ago
5.0
(2)
Preview
Mammals
Flashcard (57)
Studied by 17 people
707 days ago
5.0
(1)
Preview
Chapter 6 End of Chapter Questions
Flashcard (40)
Studied by 35 people
13 minutes ago
5.0
(1)
Preview