WEEK 2 - ITEC 100

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

-a method of protecting and controlling the risks associated with private data while it is being delivered, processed, and stored.

-primarily concerned with making sure the information system operates as required while maintaining security that authorized users may access.

Information Assurance

2
New cards

-the process of protecting data by minimizing information risks, which includes eliminating the likelihood of misuse or unauthorized access to data.

-main focus of information security is providing balanced protection against cyber attacks and hacking while maintaining CIA of data.

Information Security

3
New cards

is keeping disclosure and permitted access boundaries in place, protecting private data, and protecting individual privacy.

Confidentiality

4
New cards

comprises preventing unauthorized modification or removal and guaranteeing the authenticity and non-repudiation of data.

Integrity

5
New cards

ensures reliable access to information at the appropriate time

Availability

6
New cards

Technology brings impactful changes that can make business flourish.

Foundation of Security

7
New cards

A number of frameworks, including those from the National Institute of Standards and Technology (NIST), assist organizations in putting security measures in place and reducing risks.

Security Frameworks

8
New cards

To create safe systems, it is essential to comprehend_______________ design principles.

Software Security

9
New cards

Effective cybersecurity management requires an understanding of potential ___________

Threats and Vulnerabilities

10
New cards

This entails employing technologies, procedures, and policies to defend networks, systems, and data against cyberattacks.

Cybersecurity

11
New cards

Security plays a vital role in our daily lives. It is essential to protect us, our families, our homes, and our businesses. Security covers a wide variety of issues, from ensuring our physical safety and protection to securing our digital data and privacy

Importance of Security

12
New cards

CIA Triad 3

Confidentiality

Integrity

Availability

13
New cards

Foundation of Security 3

Security Frameworks

Software Security

Threats and Vulnerabilities

Cybersecurity