Foundations of Information Systems: Information Security and Control

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key vocabulary and concepts related to information security and control as discussed in the Foundations of Information Systems course.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Information Security

The processes and policies designed to protect an organization’s information and ISs from unauthorized access, use, disclosure, disruption, modification, or destruction.

2
New cards

Unintentional Threats

Acts performed without malicious intent that represent a serious threat to information security, often stemming from human error.

3
New cards

Social Engineering

An attack where the perpetrator uses social skills to trick employees into providing confidential company information.

4
New cards

Ransomware

A type of malicious software that blocks access to a system or encrypts data until a ransom is paid.

5
New cards

Risk Mitigation Strategies

Strategies to manage risks including risk acceptance, risk limitation, and risk transference.

6
New cards

Human Mistakes

Errors made by individuals that can lead to breaches in information security, such as carelessness with devices and poor password management.

7
New cards

Access Controls

Measures put in place to restrict unauthorized individuals from using information resources.

8
New cards

Physical Controls

Controls that prevent unauthorized access to a company’s facilities, such as gates, guards, and alarm systems.

9
New cards

Deliberate Threats

Intentional actions aimed at compromising information systems, such as espionage, sabotage, and data theft.

10
New cards

Firewalls

Security devices or software that monitor and control incoming and outgoing network traffic based on predetermined security rules.

Explore top flashcards