Home
Explore
Exams
Search for anything
Login
Get started
Home
CHAPTER 2 ITM
CHAPTER 2 ITM
0.0
(0)
Rate it
Studied by 0 people
View linked note
Knowt Play
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/31
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
32 Terms
View all (32)
Star these 32
1
New cards
antivirus software
Software installed on computers to regularly scan for viruses in memory and disk drives.
2
New cards
attack vector
The technique used to gain unauthorized access to a device or a network.
3
New cards
biometric authentication
Verifying identity using physiological or behavioral measures, such as fingerprints or voice recognition.
4
New cards
Botnet
A large group of computers controlled remotely by hackers without the owners' knowledge.
5
New cards
bring your own device (BYOD)
A business policy allowing employees to use personal mobile devices for work.
6
New cards
business continuity plan
Document including an organization’s disaster recovery, emergency evacuation, and incident management plans.
7
New cards
CIA security triad
Confidentiality, integrity, and availability—key principles of information security.
8
New cards
computer forensics
The discipline of collecting and preserving data from computer systems for legal evidence.
9
New cards
Cyberespionage
Using malware to secretly steal data from organizations' computer systems.
10
New cards
Cyberterrorism
Using information technology to intimidate or disable national infrastructure for political or ideological goals.
11
New cards
data breach
The unintended release or access of sensitive data by unauthorized individuals.
12
New cards
Department of Homeland Security (DHS)
A federal agency focused on ensuring a safe and secure America against terrorism and threats.
13
New cards
disaster recovery plan
Documented steps for recovering an organization’s IT assets in the event of a disaster.
14
New cards
distributed denial-of-service (DDoS) attack
Cyberattack that floods a target site with demands from compromised computers.
15
New cards
Encryption
The process of converting data into a coded format to prevent unauthorized access.
16
New cards
encryption key
A value used to transform plaintext into ciphertext, making it unreadable without the key.
17
New cards
Exploit
An attack that takes advantage of vulnerabilities in an information system.
18
New cards
Failover
Backup technique that switches applications to a redundant system to avoid service interruptions.
19
New cards
Firewall
System that monitors and controls incoming and outgoing network traffic based on security policies.
20
New cards
intrusion detection system (IDS)
System that monitors network traffic for security breaches and notifies personnel.
21
New cards
managed security service provider (MSSP)
Company that manages and maintains security for other organizations' networks.
22
New cards
mission-critical processes
Processes essential for an organization’s operations and achieving its goals.
23
New cards
next-generation firewall (NGFW)
Advanced firewall that can detect and block complex cyberattacks based on traffic content.
24
New cards
Ransomware
Malware that restricts access to a computer or data until demands are met.
25
New cards
reasonable assurance
The balance managers must find between control costs and system benefits or risks.
26
New cards
risk assessment
The process of evaluating security risks to an organization’s IT infrastructure.
27
New cards
security audit
Process for identifying threats, assessing current security, and planning improvements.
28
New cards
security policy
Document defining security requirements and necessary controls within an organization.
29
New cards
Transport Layer Security (TLS)
Protocol ensuring privacy and security for communications over the Internet.
30
New cards
U.S. Computer Emergency Readiness Team (US-CERT)
Partnership established to manage security incidents and improve analysis of threats.
31
New cards
virus signature
Code that detects a specific virus presence in a computer system.
32
New cards
zero-day attack
An attack that occurs before a security vulnerability is known and fixed.
Explore top notes
Indo Basic Vocabulary
Updated 683d ago
Note
Preview
UO6 and UO7
Updated 834d ago
Note
Preview
Genetic Factors
Updated 225d ago
Note
Preview
Chapter 18: Fires and Explosives
Updated 894d ago
Note
Preview
Spanish 9B
Updated 828d ago
Note
Preview
Chapter 34 - The Colonies Become New Nations
Updated 1199d ago
Note
Preview
Civil Liberties
Updated 992d ago
Note
Preview
Rhetorical Devices to Know for the AP Lang Exam (AP)
Updated 295d ago
Note
Preview
Explore top flashcards
Analgesics, Muscle relaxants, Anti-epileptic, Anti-parkinson
Updated 885d ago
Flashcards (126)
Preview
Microbio Exam 3
Updated 525d ago
Flashcards (40)
Preview
The Periodic Table Test Review
Updated 332d ago
Flashcards (35)
Preview
Computer Science GCSE Data Representation
Updated 544d ago
Flashcards (23)
Preview
Chemical Changes for Separate Science
Updated 904d ago
Flashcards (58)
Preview
VIBRIO, AEROMONAS, HELICOBACTER SPECIES (MODULE 6)
Updated 690d ago
Flashcards (131)
Preview
APGOV Chapter 5
Updated 908d ago
Flashcards (21)
Preview
class 7-10 ush
Updated 22m ago
Flashcards (46)
Preview