1/9
Flashcards focusing on key vocabulary related to securing information systems from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ransomware
A malicious software that encrypts data and demands payment for the decryption key.
Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Denial-of-service (DoS) attack
A cyber attack intended to shut down a machine or network, making it inaccessible to users.
Phishing
A method of trying to gather personal information using deceptive e-mails and websites.
Cyberterrorism
The use of technology to disrupt and damage systems for the purposes of political gain.
Firewalls
Security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
Identity and Access Management (IAM)
Processes and technologies for managing user identities and access to resources.
Security Policy
A formalized set of rules that members of an organization must follow regarding information security.
Access Control
A security technique that regulates who or what can view or use resources in a computing environment.