CHAPTER 2 ITM

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards
antivirus software
Software installed on computers to regularly scan for viruses in memory and disk drives.
2
New cards
attack vector
The technique used to gain unauthorized access to a device or a network.
3
New cards
biometric authentication
Verifying identity using physiological or behavioral measures, such as fingerprints or voice recognition.
4
New cards
Botnet
A large group of computers controlled remotely by hackers without the owners' knowledge.
5
New cards
bring your own device (BYOD)
A business policy allowing employees to use personal mobile devices for work.
6
New cards
business continuity plan
Document including an organization’s disaster recovery, emergency evacuation, and incident management plans.
7
New cards
CIA security triad
Confidentiality, integrity, and availability—key principles of information security.
8
New cards
computer forensics
The discipline of collecting and preserving data from computer systems for legal evidence.
9
New cards
Cyberespionage
Using malware to secretly steal data from organizations' computer systems.
10
New cards
Cyberterrorism
Using information technology to intimidate or disable national infrastructure for political or ideological goals.
11
New cards
data breach
The unintended release or access of sensitive data by unauthorized individuals.
12
New cards
Department of Homeland Security (DHS)
A federal agency focused on ensuring a safe and secure America against terrorism and threats.
13
New cards
disaster recovery plan
Documented steps for recovering an organization’s IT assets in the event of a disaster.
14
New cards
distributed denial-of-service (DDoS) attack
Cyberattack that floods a target site with demands from compromised computers.
15
New cards
Encryption
The process of converting data into a coded format to prevent unauthorized access.
16
New cards
encryption key
A value used to transform plaintext into ciphertext, making it unreadable without the key.
17
New cards
Exploit
An attack that takes advantage of vulnerabilities in an information system.
18
New cards
Failover
Backup technique that switches applications to a redundant system to avoid service interruptions.
19
New cards
Firewall
System that monitors and controls incoming and outgoing network traffic based on security policies.
20
New cards
intrusion detection system (IDS)
System that monitors network traffic for security breaches and notifies personnel.
21
New cards
managed security service provider (MSSP)
Company that manages and maintains security for other organizations' networks.
22
New cards
mission-critical processes
Processes essential for an organization’s operations and achieving its goals.
23
New cards
next-generation firewall (NGFW)
Advanced firewall that can detect and block complex cyberattacks based on traffic content.
24
New cards
Ransomware
Malware that restricts access to a computer or data until demands are met.
25
New cards
reasonable assurance
The balance managers must find between control costs and system benefits or risks.
26
New cards
risk assessment
The process of evaluating security risks to an organization’s IT infrastructure.
27
New cards
security audit
Process for identifying threats, assessing current security, and planning improvements.
28
New cards
security policy
Document defining security requirements and necessary controls within an organization.
29
New cards
Transport Layer Security (TLS)
Protocol ensuring privacy and security for communications over the Internet.
30
New cards
U.S. Computer Emergency Readiness Team (US-CERT)
Partnership established to manage security incidents and improve analysis of threats.
31
New cards
virus signature
Code that detects a specific virus presence in a computer system.
32
New cards
zero-day attack
An attack that occurs before a security vulnerability is known and fixed.