1/17
A comprehensive set of flashcards covering key concepts related to securing information systems.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Security
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, or theft of information systems.
Control
Methods, policies, and organizational procedures ensuring safety of assets, records reliability, and adherence to management standards.
Vulnerability
A weakness within a system that can lead to loss or harm.
Threat
Potential cause of an unwanted incident, which may result in harm to a system or organization.
Internet security challenges
Includes threats such as computer viruses, hacking, theft, and fraud affecting corporate systems.
Malicious Software (Malware)
Programs that are intended to harm or exploit any programmable device or network, including viruses, worms, and Trojan horses.
Hacker
An individual attempting to gain unauthorized access to a computer system.
Denial-of-Service Attack
A cyberattack where hackers flood a network to make services unavailable.
Computer Forensics
The collection, examination, and analysis of data from computer storage for use as evidence in a court.
Biometric Authentication
Authentication method using physical traits such as fingerprints or irises to verify identity.
Firewall
A combination of hardware and software that controls network traffic to prevent unauthorized access.
Intrusion Detection System (IDS)
Monitoring tools designed to detect and deter intrusions in corporate networks.
Encryption
The process of converting plaintext into cipher text for secure communication.
Access Control
Policies and procedures to prevent improper access to systems by unauthorized individuals.
Security Measures
Protocols including smart cards, backup files, and security monitors to protect systems.
Confidentiality
Protection of sensitive information ensuring that it is only accessible to authorized individuals.
Integrity
Assurance that information is accurate and reliable throughout its lifecycle.
Availability
Ensuring that authorized users have access to information systems and assets when needed.