1/9
These flashcards encompass key concepts related to IT security as outlined in the lecture notes, focusing on the CIA triad and associated terminology.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Confidentiality
Measures taken to ensure that sensitive information is not disclosed to unauthorized individuals, entities, or processes.
Integrity
Protecting data from unauthorized changes to ensure its reliability and correctness.
Availability
Ensuring that data, systems, and services are accessible to authorized users when needed.
CIA Triad
An acronym that stands for Confidentiality, Integrity, and Availability, representing the three main goals of IT security.
Access Control
Mechanisms used to ensure only authorized subjects can access objects such as files or systems.
Encryption
A method that secures data by transforming it into a format that is unreadable without the correct decryption key.
Access Control List (ACL)
A list that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
Digital Signature
A mathematical scheme for verifying the authenticity and integrity of a message, document, or software.
DDoS Attack
A Distributed Denial of Service attack that aims to make a machine or network resource unavailable by overwhelming it with traffic.
Backup
The process of copying and archiving computer data so it may be used to restore the original after a data loss event.