1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
consists of a collection of tools, processes, and an overarching architectural framework designed to safeguard an enterprises entire computing environment.
Platform Security
relies on
physical devices and
mechanisms for protection,
rather than depending solely on
security software like antivirus
programs.
Hardware security
Involves unauthorized access to hardware devices to alter, damage, or
manipulate them.
Physical Tampering
Exploit unintended information leakage from a device's physical operations,
such as power consumption, electromagnetic emissions, or timing variations.
Side-Channel Attacks
Involves intercepting and monitoring electronic signals or communications without authorization.
Eavesdropping
Refers to the use of unauthorized or fake hardware components, which may contain vulnerabilities or malicious code.
Counterfeit Hardware
is a specialized chip embedded in a device that provides
hardware-based security functions.
Trusted Platform Module (TPM)
are dedicated physical devices used to manage, generate, and
store cryptographic keys.
Hardware Security Modules (HSM)
ensures that only trusted and verified software (such as
the operating system and firmware) loads during the startup
process.
Secure Boot Process
Encryption converts data into a secure format that can only be
accessed using a decryption key.
Encryption and Secure Storage
involves a set of techniques designed to safeguard computer programs
and the sensitive data they manage from malicious threats.
IS A BROAD APPROACH TO PROTECT AN ORGANIZATION'S DATA AND SYSTEMS, IS ADDRESSED DURING DEVELOPMENT TO
PREVENT VULNERABILITIES
Software security
FOCUSES ON SECURING INDIVIDUAL APPLICATIONS. OFTEN OCCURS POST-DEPLOYMENT.
APPLICATION SECURITY