MIDTERM DP

5.0(3)
Studied by 11 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:19 PM on 9/30/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

54 Terms

1
New cards

Security objectives

These are goals and constraints that affect the confidentiality, integrity, and availability of your data and application.

2
New cards

Confidentiality

This property means that information is not made available or disclosed to unauthorized individuals, entities, or processes.

3
New cards

Data integrity

It ensures that data and programs are changed only in a specified and authorized manner.

4
New cards

System integrity

It ensures that a system performs its intended function in an unimpaired manner.

5
New cards

Availability

It ensures that systems work promptly and the service is not denied to authorized users.

6
New cards

Authenticity

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator.

7
New cards

Accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

8
New cards

Security attacks

These are any action that compromises the security of information owned by an organization.

9
New cards

Security mechanisms

These are technical tools and techniques that are used to implement security services.

10
New cards

Security service

It is a processing or communication service that enhances the security of the data processing systems, and the information transfers of an organization.

11
New cards

Passive attacks

It is like eavesdropping or monitoring transmissions. The goal of the attacker is to obtain information that is being transmitted.

12
New cards

Release of message contents

An attacker will monitor an unprotected communication medium like unencrypted email or telephone call and intercept it for sensitive information.

13
New cards

Traffic analysis

An attacker monitors communication channels to collect a range of information, including human and machine identities, locations of these identities, and types of encryption

14
New cards

Active attacks

It involves some modification of stored or transmitted data or the creation of false data.

15
New cards

masquerade

It takes place when one entity pretends to be a different entity.

16
New cards

Replay

It involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

17
New cards

Data modification

It simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effect.

18
New cards

denial-of-service attack

It prevents or inhibits the normal use or management of communication facilities.

19
New cards

Authentication

It is to ensure the recipient that the message is from the source that it claims to be from.

20
New cards

Access control

It is the ability to limit and control access to host systems and applications via communications links.

21
New cards

Data confidentiality

It is the protection of transmitted data from passive attacks.

22
New cards

Data integrity

It ensures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays

23
New cards

Nonrepudiation

It prevents either a sender or a receiver from denying a transmitted message.

24
New cards

Availability service

It means that a system or a system resource is accessible and usable upon demand by an authorized system entity

25
New cards

Online privacy

It refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps.

26
New cards

Data collectors

collect information directly from their customers, audience, or other types of users of their services.

27
New cards

Data brokers

compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.

28
New cards

data users

This category encompasses a broad range. One type of _____ is a business that wants to target its advertisements and special offers. Other uses are fraud prevention and credit risk assessment.

29
New cards

WWW

It is fundamentally a client/server application running over the Internet.

30
New cards

Web server security and privacy

It is concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.

31
New cards

Web application security and privacy

It is concerned with web software, including any applications accessible via the Web.

32
New cards

Web browser security and privacy

It is concerned with the browser used from a client system to access a web server.

33
New cards

Cellular and Wi-Fi infrastructure

Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls. Cellular network cores also rely upon authentication servers to use and store customer authentication information.

34
New cards

Public application stores (public app stores)

These stores invest considerable effort in detecting and thwarting malware and ensuring that the apps do not cause unwanted behavior on mobile devices.

35
New cards

Device and OS vendor infrastructure

Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device.

36
New cards

Enterprise mobility management (EMM)

It is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).

37
New cards

app vetting

The process of evaluation and approval or rejection of apps within an organization

38
New cards

administrator

It is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices

39
New cards

auditor

It inspects reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements of the organization.

40
New cards

Web application privacy

The goal of the project is to identify the most important technical and organizational privacy risks for web applications from the perspectives of both the user (data subject) and the provider (data owner).

41
New cards

Web application vulnerabilities

Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach.

42
New cards

User-side data leakage

Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality.

43
New cards

Insufficient data breach response

Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.

44
New cards

Insufficient deletion of personal data

Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.

45
New cards

Non-transparent policies, terms, and conditions

Not providing sufficient information describing how data are processed, such as their collection, storage, and processing.

46
New cards

Collection of data not required for the primary purpose

Collecting descriptive, demographic, or any other user-related data that are not needed for the system. Applies also to data for which the user did not provide consent.

47
New cards

Sharing of data with a third party

Providing user data to a third party without obtaining the user’s consent.

48
New cards

Outdated personal data

Using outdated, incorrect, or bogus user data and failing to update or correct the data.

49
New cards

Missing or insufficient session expiration

Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness.

50
New cards

Insecure data transfer

Failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage.

51
New cards

Mobile app privacy

Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system.

52
New cards

Insecure network communications

Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping.

53
New cards

Web browser vulnerabilities

Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.

54
New cards

Vulnerabilities in third-party libraries

Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors.

Explore top notes

note
Diseases: Cause and Control
Updated 1079d ago
0.0(0)
note
Group 16 elements
Updated 1339d ago
0.0(0)
note
APUSH Unit 2
Updated 683d ago
0.0(0)
note
Physics 3.6
Updated 561d ago
0.0(0)
note
Chapter 15- Electrolysis
Updated 1271d ago
0.0(0)
note
Diseases: Cause and Control
Updated 1079d ago
0.0(0)
note
Group 16 elements
Updated 1339d ago
0.0(0)
note
APUSH Unit 2
Updated 683d ago
0.0(0)
note
Physics 3.6
Updated 561d ago
0.0(0)
note
Chapter 15- Electrolysis
Updated 1271d ago
0.0(0)

Explore top flashcards

flashcards
deelsteppen
87
Updated 1101d ago
0.0(0)
flashcards
지혜쓰 몇살이시조
198
Updated 865d ago
0.0(0)
flashcards
Lesson 12 vocab
48
Updated 435d ago
0.0(0)
flashcards
Atmosphere and Pollutants
53
Updated 689d ago
0.0(0)
flashcards
Unit 3 - Grade 9
32
Updated 371d ago
0.0(0)
flashcards
IAC Science Study Guide
51
Updated 355d ago
0.0(0)
flashcards
AP Psych Unit 5
55
Updated 1203d ago
0.0(0)
flashcards
history study guide #1 !!!
28
Updated 354d ago
0.0(0)
flashcards
deelsteppen
87
Updated 1101d ago
0.0(0)
flashcards
지혜쓰 몇살이시조
198
Updated 865d ago
0.0(0)
flashcards
Lesson 12 vocab
48
Updated 435d ago
0.0(0)
flashcards
Atmosphere and Pollutants
53
Updated 689d ago
0.0(0)
flashcards
Unit 3 - Grade 9
32
Updated 371d ago
0.0(0)
flashcards
IAC Science Study Guide
51
Updated 355d ago
0.0(0)
flashcards
AP Psych Unit 5
55
Updated 1203d ago
0.0(0)
flashcards
history study guide #1 !!!
28
Updated 354d ago
0.0(0)