ITEC 100- WEEK 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

consists of a collection of tools, processes, and an overarching architectural framework designed to safeguard an enterprises entire computing environment.

Platform Security

2
New cards

relies on

physical devices and

mechanisms for protection,

rather than depending solely on

security software like antivirus

programs.

Hardware security

3
New cards

Involves unauthorized access to hardware devices to alter, damage, or

manipulate them.

Physical Tampering

4
New cards

Exploit unintended information leakage from a device's physical operations,

such as power consumption, electromagnetic emissions, or timing variations.

Side-Channel Attacks

5
New cards

Involves intercepting and monitoring electronic signals or communications without authorization.

Eavesdropping

6
New cards

Refers to the use of unauthorized or fake hardware components, which may contain vulnerabilities or malicious code.

Counterfeit Hardware

7
New cards

is a specialized chip embedded in a device that provides

hardware-based security functions.

Trusted Platform Module (TPM)

8
New cards

are dedicated physical devices used to manage, generate, and

store cryptographic keys.

Hardware Security Modules (HSM)

9
New cards

ensures that only trusted and verified software (such as

the operating system and firmware) loads during the startup

process.

Secure Boot Process

10
New cards

Encryption converts data into a secure format that can only be

accessed using a decryption key.

Encryption and Secure Storage

11
New cards

involves a set of techniques designed to safeguard computer programs

and the sensitive data they manage from malicious threats.

IS A BROAD APPROACH TO PROTECT AN ORGANIZATION'S DATA AND SYSTEMS, IS ADDRESSED DURING DEVELOPMENT TO

PREVENT VULNERABILITIES

Software security

12
New cards

FOCUSES ON SECURING INDIVIDUAL APPLICATIONS. OFTEN OCCURS POST-DEPLOYMENT.

APPLICATION SECURITY