1/14
A set of vocabulary flashcards covering key security concepts related to business communications networks.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Ransomware
A type of malware that encrypts a user's files and demands payment to restore access.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Denial of Service (DoS) Attack
An attempt to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.
Social Engineering
The manipulation of individuals into divulging confidential or personal information for fraudulent purposes.
Intrusion Prevention System (IPS)
A system designed to detect and prevent identified threats.
Confidentiality
The principle of keeping information secret or private.
Integrity
The assurance that information is accurate and trustworthy.
Availability
The guarantee of uninterrupted access to information by authorized entities.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
Risk Assessment
The identification and evaluation of risks to an organization's assets.
Disaster Recovery Plan (DRP)
A documented process to recover and protect a business IT infrastructure in the event of a disaster.
Trojan Horse
Malicious software that misrepresents itself as a legitimate application.
Digital Signature
A mathematical scheme for verifying the authenticity and integrity of a message, software, or digital document.