Set 10 – Networks, Systems, and Encryption

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms from Set 10 notes on networks, systems, and privacy concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Layered Security Policy

Security approach with multiple levels: high-level policy, detailed controls, and operating procedures.

2
New cards

Least Privilege

Principle of giving users the minimal access necessary to perform their tasks.

3
New cards

Linkability

Degree to which identifiers can be combined with outside information to identify a person.

4
New cards

Local Area Network (LAN)

Network within a local facility, managed under local operational control.

5
New cards

Local Shared Objects (Flash Cookies)

Data files created by Flash Player stored on a hard drive, often for user tracking.

6
New cards

Location-Based Service

Services using geographic location (via GPS, RFID, etc.) for applications like social networking.

7
New cards

Logs

Records of events by applications or operating systems for monitoring or auditing.

8
New cards

Mandatory Access Control (MAC)

Access control where access decisions are enforced by the operating system.

9
New cards

Metadata

Data that describes other data, such as file attributes or database schema.

10
New cards

Microdata Sets

Anonymized groups of individual-level data used for analysis.

11
New cards

Multi-Factor Authentication (MFA)

Using multiple authentication factors, like passwords plus biometrics.

12
New cards

Network Devices

Components connecting computers in networks, like routers, switches, and hubs.

13
New cards

Network Encryption

Encryption applied at the network transfer layer to protect data in transit.

14
New cards

Network-Layer Attacks

Exploits targeting core network protocols, such as spoofing or denial of service attacks.

15
New cards

Non-Functional System Requirements

Abstract requirements describing how a system should perform rather than its functions.

16
New cards

Obfuscation

Deliberately making something harder to understand to hide its true meaning.

17
New cards

OECD Guidelines

Eight principles: Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Participation, Accountability.

18
New cards

Omnibus Laws

Laws covering privacy and data protection across entire economies and sectors.

19
New cards

Online Behavioral Advertising

Ads tailored based on tracking users’ online activity, preferences, and demographics.

20
New cards

Online Data Storage

Storing data via third-party internet-accessible services (cloud storage).

21
New cards

Opt-In

Active choice by individuals to allow collection or sharing of their data.

22
New cards

Opt-Out

Default choice where data is shared unless individuals take action to prevent it.

23
New cards

OECD

Organization for Economic Cooperation and Development, promoting global economic policies.

24
New cards

Passive Collection

Collecting data without the subject’s knowledge.

25
New cards

Perimeter Controls

Technologies protecting networks from external penetration.

26
New cards

PCI Security Standards Council

Body creating PCI DSS standards for payment card security.

27
New cards

Persistent Storage

Non-volatile storage like hard drives that retains data after power loss.

28
New cards

Personal Information

Data relating to an identifiable individual, called PII in the U.S.

29
New cards

Pharming

Redirecting traffic from valid websites to malicious sites by corrupting DNS or host files.

30
New cards

Plan-Driven Development Model

Software development focusing on full system design before implementation.

31
New cards

Phishing

Fraudulent communications designed to trick users into disclosing sensitive information.