Securing Information Systems

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key concepts related to securing information systems.

Last updated 7:13 PM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Security

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, or theft of information systems.

2
New cards

Control

Methods, policies, and organizational procedures ensuring safety of assets, records reliability, and adherence to management standards.

3
New cards

Vulnerability

A weakness within a system that can lead to loss or harm.

4
New cards

Threat

Potential cause of an unwanted incident, which may result in harm to a system or organization.

5
New cards

Internet security challenges

Includes threats such as computer viruses, hacking, theft, and fraud affecting corporate systems.

6
New cards

Malicious Software (Malware)

Programs that are intended to harm or exploit any programmable device or network, including viruses, worms, and Trojan horses.

7
New cards

Hacker

An individual attempting to gain unauthorized access to a computer system.

8
New cards

Denial-of-Service Attack

A cyberattack where hackers flood a network to make services unavailable.

9
New cards

Computer Forensics

The collection, examination, and analysis of data from computer storage for use as evidence in a court.

10
New cards

Biometric Authentication

Authentication method using physical traits such as fingerprints or irises to verify identity.

11
New cards

Firewall

A combination of hardware and software that controls network traffic to prevent unauthorized access.

12
New cards

Intrusion Detection System (IDS)

Monitoring tools designed to detect and deter intrusions in corporate networks.

13
New cards

Encryption

The process of converting plaintext into cipher text for secure communication.

14
New cards

Access Control

Policies and procedures to prevent improper access to systems by unauthorized individuals.

15
New cards

Security Measures

Protocols including smart cards, backup files, and security monitors to protect systems.

16
New cards

Confidentiality

Protection of sensitive information ensuring that it is only accessible to authorized individuals.

17
New cards

Integrity

Assurance that information is accurate and reliable throughout its lifecycle.

18
New cards

Availability

Ensuring that authorized users have access to information systems and assets when needed.