CHAPTER 2 ITM

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 31

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

32 Terms

1
antivirus software
Software installed on computers to regularly scan for viruses in memory and disk drives.
New cards
2
attack vector
The technique used to gain unauthorized access to a device or a network.
New cards
3
biometric authentication
Verifying identity using physiological or behavioral measures, such as fingerprints or voice recognition.
New cards
4
Botnet
A large group of computers controlled remotely by hackers without the owners' knowledge.
New cards
5
bring your own device (BYOD)
A business policy allowing employees to use personal mobile devices for work.
New cards
6
business continuity plan
Document including an organization’s disaster recovery, emergency evacuation, and incident management plans.
New cards
7
CIA security triad
Confidentiality, integrity, and availability—key principles of information security.
New cards
8
computer forensics
The discipline of collecting and preserving data from computer systems for legal evidence.
New cards
9
Cyberespionage
Using malware to secretly steal data from organizations' computer systems.
New cards
10
Cyberterrorism
Using information technology to intimidate or disable national infrastructure for political or ideological goals.
New cards
11
data breach
The unintended release or access of sensitive data by unauthorized individuals.
New cards
12
Department of Homeland Security (DHS)
A federal agency focused on ensuring a safe and secure America against terrorism and threats.
New cards
13
disaster recovery plan
Documented steps for recovering an organization’s IT assets in the event of a disaster.
New cards
14
distributed denial-of-service (DDoS) attack
Cyberattack that floods a target site with demands from compromised computers.
New cards
15
Encryption
The process of converting data into a coded format to prevent unauthorized access.
New cards
16
encryption key
A value used to transform plaintext into ciphertext, making it unreadable without the key.
New cards
17
Exploit
An attack that takes advantage of vulnerabilities in an information system.
New cards
18
Failover
Backup technique that switches applications to a redundant system to avoid service interruptions.
New cards
19
Firewall
System that monitors and controls incoming and outgoing network traffic based on security policies.
New cards
20
intrusion detection system (IDS)
System that monitors network traffic for security breaches and notifies personnel.
New cards
21
managed security service provider (MSSP)
Company that manages and maintains security for other organizations' networks.
New cards
22
mission-critical processes
Processes essential for an organization’s operations and achieving its goals.
New cards
23
next-generation firewall (NGFW)
Advanced firewall that can detect and block complex cyberattacks based on traffic content.
New cards
24
Ransomware
Malware that restricts access to a computer or data until demands are met.
New cards
25
reasonable assurance
The balance managers must find between control costs and system benefits or risks.
New cards
26
risk assessment
The process of evaluating security risks to an organization’s IT infrastructure.
New cards
27
security audit
Process for identifying threats, assessing current security, and planning improvements.
New cards
28
security policy
Document defining security requirements and necessary controls within an organization.
New cards
29
Transport Layer Security (TLS)
Protocol ensuring privacy and security for communications over the Internet.
New cards
30
U.S. Computer Emergency Readiness Team (US-CERT)
Partnership established to manage security incidents and improve analysis of threats.
New cards
31
virus signature
Code that detects a specific virus presence in a computer system.
New cards
32
zero-day attack
An attack that occurs before a security vulnerability is known and fixed.
New cards
robot