Information Systems Security - Key Terms and Definitions

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

flashcard set

Earn XP

Description and Tags

Practice flashcards for key terms and definitions in Information Systems Security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Availability

Ensuring that data and services are accessible when needed.

2
New cards

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

A network protocol that manages data transmission and collision detection.

3
New cards

Certified Information Systems Security Professional (CISSP)

A globally recognized certification for information security professionals.

4
New cards

Cleartext

Data that is transmitted or stored without encryption.

5
New cards

Confidentiality

Ensuring that information is not disclosed to unauthorized individuals.

6
New cards

Confidentiality, integrity, and availability (C-I-A)

The three key principles of information security.

7
New cards

Content filtering

A security measure that blocks or restricts access to certain types of content.

8
New cards

Cybersecurity

Practices and technologies designed to protect systems from cyber threats.

9
New cards

Cyberspace

The virtual environment of digital networks and systems.

10
New cards

Data breach

An incident in which sensitive or confidential data is accessed without authorization.

11
New cards

Data classification standard

A framework for categorizing data based on sensitivity and access control needs.

12
New cards

Downtime

The period when a system or service is unavailable.

13
New cards

End-User License Agreement (EULA)

A legal contract between a software provider and the user, outlining usage rights.

14
New cards

Ethernet

A widely used wired networking technology for local area networks (LANs).

15
New cards

FICO

A company known for providing credit scores used in financial risk assessment.

16
New cards

File Transfer Protocol (FTP)

A standard network protocol for transferring files over the internet.

17
New cards

General Data Protection Regulation (GDPR)

A European Union regulation focused on data privacy and security.

18
New cards

Hardening

The process of securing a system by reducing vulnerabilities.

19
New cards

Hypertext Transfer Protocol (HTTP)

A protocol for transmitting web pages over the internet.

20
New cards

Hypertext Transfer Protocol Secure (HTTPS)

A secure version of HTTP that encrypts data transmitted between a browser and a server.

21
New cards

Identity theft

The fraudulent acquisition and use of someone's personal information.

22
New cards

Information security

The practice of protecting information from unauthorized access, use, or modification.

23
New cards

Information systems

A combination of technology, people, and processes used to manage and process data.

24
New cards

Information systems security

Measures taken to protect information systems from cyber threats.

25
New cards

Institute of Electrical and Electronics Engineers (IEEE)

A professional organization that develops technology standards.

26
New cards

Integrity

Ensuring data is accurate and has not been altered without authorization.

27
New cards

Internet

A global network that connects millions of computers for communication and data exchange.

28
New cards

Intrusion detection system/intrusion prevention system (IDS/IPS)

Security tools used to detect and prevent unauthorized access to networks.

29
New cards

IP default gateway router

A networking device that directs traffic from a local network to other networks.

30
New cards

IP stateful firewall

A firewall that monitors active connections and enforces security rules.

31
New cards

IT security policy framework

A set of policies and guidelines for securing IT systems.

32
New cards

Layer 2 switch

A network switch that operates at the data link layer and forwards data based on MAC addresses.

33
New cards

Layer 3 switch

A switch that operates at the network layer and can route traffic based on IP addresses.

34
New cards

Local area network (LAN)

A network that connects computers within a small geographical area.

35
New cards

Masking

The process of hiding or obfuscating data to protect sensitive information.

36
New cards

Network interface controller (NIC)

A hardware component that connects a computer to a network.

37
New cards

Network key

A security key used to authenticate access to a wireless network.

38
New cards

Protocol

A set of rules for transmitting data over a network.

39
New cards

Risk

The likelihood of a security threat exploiting a vulnerability.

40
New cards

Secure Sockets Layer virtual private network (SSL-VPN)

A type of VPN that uses SSL encryption for secure remote access.

41
New cards

Security

Measures taken to protect systems and data from unauthorized access or attacks.

42
New cards

Security control

Policies or mechanisms implemented to protect an organization's assets.

43
New cards

Service-level agreement (SLA)

A contract between a service provider and a client outlining service expectations.

44
New cards

Smartphone

A mobile device with computing and networking capabilities.

45
New cards

Software vulnerability

A flaw in software that can be exploited by attackers.

46
New cards

Telnet

A network protocol used for remote command-line access to systems.

47
New cards

Thick client

A computer that performs most processing locally rather than relying on a server.

48
New cards

Thin client

A computer that relies on a central server for processing and storage.

49
New cards

Threat

A potential danger that could exploit a system's vulnerability.

50
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

A fundamental networking protocol suite for internet communication.

51
New cards

Trivial File Transfer Protocol (TFTP)

A simplified file transfer protocol with minimal security features.

52
New cards

Unified communications

Integration of communication tools such as voice, video, and messaging.

53
New cards

Uptime

The percentage of time a system is operational and available.

54
New cards

Virtual LAN (VLAN)

A network segmentation technique that groups devices logically instead of physically.

55
New cards

Virtual private network (VPN)

A secure network connection over the internet that protects data from interception.

56
New cards

Vulnerability

A weakness in a system that can be exploited by threats.

57
New cards

Vulnerability window

The time between discovering a vulnerability and deploying a fix.

58
New cards

Wireless access point (WAP)

A device that allows wireless devices to connect to a network.

59
New cards

Wi-Fi

A wireless networking technology for connecting devices to the internet.

60
New cards

Wireless LAN (WLAN)

A network that allows wireless devices to communicate within a local area.

61
New cards

Workstation

A computer designed for professional or technical tasks.

62
New cards

World Wide Web (WWW)

A system of interlinked web pages and resources accessible via the internet.