1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data Security
Protection of digital data from unauthorized access, corruption, or theft throughout its lifecycle.
Data Classification
The process of organizing data into categories based on sensitivity and importance (e.g., public, internal, confidential, sensitive).
Confidential Data
Information that must be protected from unauthorized access to safeguard privacy or proprietary interests.
Sensitive Data
Data that, if disclosed, could cause harm to individuals or organizations (e.g., health records, financial information).
Public Data
Information that can be freely shared without risk (e.g., press releases, marketing materials).
Confidentiality
Ensuring that information is accessible only to those authorized to have access.
Integrity
Maintaining and assuring the accuracy and completeness of data over its lifecycle.
Availability
Ensuring that authorized users have access to information and systems when needed.
Authentication
The process of verifying the identity of a user, device, or system.
Non-repudiation
Assurance that someone cannot deny the validity of their digital actions (e.g., sending a message or signing a document).
Information Assurance (IA)
Measures that protect and defend information systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation.
Security Breach
An incident where data is accessed without authorization, often resulting in data loss or exposure.
Threat Actor
An individual or group that poses a potential risk to cybersecurity (e.g., hackers, insiders, nation-states).
Vulnerability
A weakness in a system that can be exploited by a threat actor.
Exploit
A method or tool used to take advantage of a vulnerability.
Physical Security
Protection of hardware, software, networks, and data from physical actions and events (e.g., theft, vandalism, natural disasters).
Access Control
Mechanisms that restrict entry to physical or digital resources (e.g., key cards, biometrics).
Surveillance Systems
Tools like cameras and sensors used to monitor and protect physical environments.
Environmental Controls
Systems that protect IT infrastructure from environmental hazards (e.g., fire suppression, climate control).
Security Perimeter
Physical boundaries designed to prevent unauthorized access to sensitive areas.