Security Threats and Controls in Business Communications Networks

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering key security concepts related to business communications networks.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

2
New cards

Ransomware

A type of malware that encrypts a user's files and demands payment to restore access.

3
New cards

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.

4
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

5
New cards

Denial of Service (DoS) Attack

An attempt to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.

6
New cards

Social Engineering

The manipulation of individuals into divulging confidential or personal information for fraudulent purposes.

7
New cards

Intrusion Prevention System (IPS)

A system designed to detect and prevent identified threats.

8
New cards

Confidentiality

The principle of keeping information secret or private.

9
New cards

Integrity

The assurance that information is accurate and trustworthy.

10
New cards

Availability

The guarantee of uninterrupted access to information by authorized entities.

11
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

12
New cards

Risk Assessment

The identification and evaluation of risks to an organization's assets.

13
New cards

Disaster Recovery Plan (DRP)

A documented process to recover and protect a business IT infrastructure in the event of a disaster.

14
New cards

Trojan Horse

Malicious software that misrepresents itself as a legitimate application.

15
New cards

Digital Signature

A mathematical scheme for verifying the authenticity and integrity of a message, software, or digital document.

Explore top flashcards

Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)
Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)