Information Systems Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Flashcards about Information Systems Security

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Confidentiality

Protecting information by restricting access to authorized individuals.

2
New cards

Integrity

Assurance that information has not been altered and represents its intended meaning.

3
New cards

Availability

Information can be accessed and modified by authorized personnel in an appropriate timeframe.

4
New cards

Authentication

Tools used to ensure that the person accessing information is who they claim to be.

5
New cards

Access Control

Ensuring users only access appropriate information resources.

6
New cards

Access Control List (ACL)

A list of users that have specific actions with information resources.

7
New cards

Role-Based Access Control (RBAC)

Users are assigned to roles, and then those roles are assigned access rights, simplifying administration and improving security.

8
New cards

Encryption

Encoding data so that only authorized individuals can read it.

9
New cards

Symmetric Key Encryption

Both parties share the same key which enables them to encode and decode each other’s messages.

10
New cards

Public Key Encryption

Two keys are used: a public key to encrypt and a private key to decrypt.

11
New cards

Blockchain

Peer-to-peer network which provides an open, distributed record of transactions between two parties, aiming to remove intermediaries.

12
New cards

Bitcoin

A worldwide payment system using cryptocurrency that operates without a central bank.

13
New cards

Uninterruptible Power Supply (UPS)

Battery backup to critical components of a system, prevents data loss from power failure.

14
New cards

Hot Sites

Alternate site where an exact replica of critical data is kept up to date.

15
New cards

Firewall

Hardware or software that filters packets based on rules.

16
New cards

Demilitarized Zone (DMZ)

Multiple firewalls as part of a network security configuration, creating partially secured sections.

17
New cards

Intrusion Detection System (IDS)

Identifies if a network is being attacked without adding security.

18
New cards

Virtual Private Network (VPN)

Secure pathway through an insecure network like the internet, guaranteeing secure access to an organization’s resources.

19
New cards

Physical Security

Protection of the actual hardware and networking components that store and transmit information resources.

20
New cards

Security Policy

Lays out employee responsibilities for using company resources and the internet.

21
New cards

Usability

users’ needs to effectively access and use these resources.

22
New cards

Personal Information Security 7steps

• Keep your software up to date.

• Install antivirus software and keep it up to date.

• Be smart about your connections.

• Backup your data.

• Secure your accounts with two-factor • authentication.

• Make your passwords long, strong, and unique.

• Be suspicious of strange links and attachments.

23
New cards

5 Physical Security measures

• Locked doors.

• Physical intrusion detection

• Secured equipment.

• Environmental monitoring

• Employee training.

24
New cards

Backups

a comprehensive backup plan for the entire

organization.

25
New cards

Governance

The banking sector, both in individual countries

26
New cards

Smart contracts. The

It is possible for

blockchain to automatically send payment to a vendor the instant the product is delivered to the customer.