Introduction to Computer Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts in Computer Security including risk management, ethical hacking, and the C.I.A. triad.

Last updated 4:39 AM on 5/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

43 Terms

1
New cards

C.I.A.

Confidentiality, Integrity, Availability

2
New cards

Confidentiality

Access to files and systems is restricted to authorized users only.

3
New cards

Integrity

Data remains unchanged and accurately represents reality over time.

4
New cards

Availability

Ensuring that data and systems are accessible to those who need them.

5
New cards

DoS

Denial of Service, an attack that aims to make a system unavailable.

6
New cards

Ransomware

Malicious software that encrypts files and demands payment for access.

7
New cards

Redundancy

Implementation of backup components to ensure system availability.

8
New cards

FSU

Functionality, Security, Usability; a framework for evaluating devices.

9
New cards

Ethical Hacking

Legitimate hacking activities conducted with permission to assess security.

10
New cards

Risk Management

The process of identifying, assessing, and prioritizing risks.

11
New cards

Threat

An agent or factor that has the potential to cause harm to an asset.

12
New cards

Vulnerability

A weakness that can be exploited by a threat to cause harm.

13
New cards

Risk

The likelihood and potential consequence of a threat materializing.

14
New cards

Reconnaissance

The phase in an attack where information is gathered about a target.

15
New cards

Scanning

The phase where live hosts and services are identified.

16
New cards

Gaining Access

The phase where unauthorized entry to a system is achieved.

17
New cards

Maintaining Access

Continued entry to a system is ensured post-breach.

18
New cards

Covering Tracks

Removing evidence of unauthorized access to a system.

19
New cards

Black Hat

An unethical hacker who breaks into systems for malicious purposes.

20
New cards

Gray Hat

A hacker who may violate ethics but does not necessarily have malicious intent.

21
New cards

White Hat

An ethical hacker who uses skills for defensive and security purposes.

22
New cards

Network Access

The ability to connect and interact with a network.

23
New cards

Weak Passwords

Simple passwords that are easy to guess or crack.

24
New cards

Strong Passwords

Complex passwords that are difficult to guess or crack.

25
New cards

Encryption

The process of converting information into a coded format to protect it.

26
New cards

CRC

Cyclic Redundancy Check, a method used for detecting errors in data.

27
New cards

Spoofing

Disguising as another device or user to gain unauthorized access.

28
New cards

Hashes

Cryptographic functions that convert data into a fixed-size string of characters.

29
New cards

UPS

Uninterruptible Power Supply; provides backup power to systems.

30
New cards

Social Engineering

Manipulating individuals into divulging confidential information.

31
New cards

Information Gathering

The process of collecting data for analysis and attack planning.

32
New cards

Risk Analysis

Evaluating the potential impact and likelihood of identified threats.

33
New cards

Mitigation Strategies

Actions taken to reduce the risk or impact of security threats.

34
New cards

Cyber Attack

An assault launched by cybercriminals using one or more computers.

35
New cards

Phishing

A fraudulent attempt to obtain sensitive information via electronic communication.

36
New cards

Patch Management

Regularly updating software to fix vulnerabilities.

37
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

38
New cards

Backup

A copy of data stored separately to protect against data loss.

39
New cards

What is the First Phase of Attack - Comprimising CIA

Reconnaissance - Gather information about a system

40
New cards

What is the Second Phase of Attack - Comprimising CIA

Scanning - Determine live systems and running services

41
New cards

What is the Third Phase of Attack - Comprimising CIA

Gaining Access - Access system resources

42
New cards

What is the Fourth Phase of Attack - Comprimising CIA

Maintaining Access - Ensure continued access to a system

43
New cards

What is the Fifth Phase of Attack - Comprimising CIA

Covering/Clearing Tracks - Remove evidence of access