Data and Information Science: Information Security Exam Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key concepts in data and information science related to information security.

Last updated 1:29 AM on 3/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

NIDS

Network Intrusion Detection System, used to monitor network traffic for suspicious activity.

2
New cards

Passive Sensor

A type of sensor that analyzes traffic without affecting the flow of data.

3
New cards

Redundancy

A measure to safeguard availability by duplicating critical system components or functions.

4
New cards

Vulnerability

A weakness in a system that can be exploited by a threat.

5
New cards

Dynamic Biometrics

Biometric traits that change over time such as voice patterns and handwriting.

6
New cards

Challenge-Response Protocol

A security protocol where a system challenges a user to provide a valid response.

7
New cards

Salt

Random data added to a password before hashing to ensure unique hashes for identical passwords.

8
New cards

Countermeasures

Actions taken to prevent or mitigate the impact of threats to a system.

9
New cards

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

10
New cards

Buffer Overflow Attack

A type of attack that occurs when more data is written to a buffer than it can hold.

11
New cards

Digital Certificate

An electronic document that verifies the ownership of a public key.

12
New cards

SSL/TLS

Protocols designed to provide secure communication over a computer network.

13
New cards

VPN

Virtual Private Network, a service that encrypts your internet connection.

14
New cards

Access Control Models

Frameworks defining how access rights are granted to users in a system.

15
New cards

Qualitative Risk Analysis

Assessment method involving judgment and intuition to evaluate risks.

16
New cards

Cryptanalysis

The study and practice of bypassing cryptographic security systems.

17
New cards

Symmetric Encryption

An encryption process using the same key for both encryption and decryption.

18
New cards

Asymmetric Encryption

An encryption method that uses a pair of keys, one public and one private.

Explore top notes

note
IGCSE: Human nutrition
Updated 465d ago
0.0(0)
note
CAVITE MUTINY
Updated 515d ago
0.0(0)
note
Human Anatomy Lecture 1:
Updated 1277d ago
0.0(0)
note
Bill of Rights
Updated 919d ago
0.0(0)
note
Homeostasis and Response
Updated 557d ago
0.0(0)
note
Developing Complex Arguments (AP)
Updated 344d ago
0.0(0)
note
Carboxylic Acids
Updated 1157d ago
0.0(0)
note
IGCSE: Human nutrition
Updated 465d ago
0.0(0)
note
CAVITE MUTINY
Updated 515d ago
0.0(0)
note
Human Anatomy Lecture 1:
Updated 1277d ago
0.0(0)
note
Bill of Rights
Updated 919d ago
0.0(0)
note
Homeostasis and Response
Updated 557d ago
0.0(0)
note
Developing Complex Arguments (AP)
Updated 344d ago
0.0(0)
note
Carboxylic Acids
Updated 1157d ago
0.0(0)

Explore top flashcards

flashcards
Unit 7 Terms (PART 2)
81
Updated 753d ago
0.0(0)
flashcards
response to industry
59
Updated 701d ago
0.0(0)
flashcards
¿Adónde fuiste?
34
Updated 767d ago
0.0(0)
flashcards
clinical ospe
86
Updated 671d ago
0.0(0)
flashcards
Science exam
167
Updated 993d ago
0.0(0)
flashcards
Pharmacology Exam 1
214
Updated 543d ago
0.0(0)
flashcards
Unit 7 Terms (PART 2)
81
Updated 753d ago
0.0(0)
flashcards
response to industry
59
Updated 701d ago
0.0(0)
flashcards
¿Adónde fuiste?
34
Updated 767d ago
0.0(0)
flashcards
clinical ospe
86
Updated 671d ago
0.0(0)
flashcards
Science exam
167
Updated 993d ago
0.0(0)
flashcards
Pharmacology Exam 1
214
Updated 543d ago
0.0(0)