1/17
A comprehensive set of flashcards covering key concepts in data and information science related to information security.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
NIDS
Network Intrusion Detection System, used to monitor network traffic for suspicious activity.
Passive Sensor
A type of sensor that analyzes traffic without affecting the flow of data.
Redundancy
A measure to safeguard availability by duplicating critical system components or functions.
Vulnerability
A weakness in a system that can be exploited by a threat.
Dynamic Biometrics
Biometric traits that change over time such as voice patterns and handwriting.
Challenge-Response Protocol
A security protocol where a system challenges a user to provide a valid response.
Salt
Random data added to a password before hashing to ensure unique hashes for identical passwords.
Countermeasures
Actions taken to prevent or mitigate the impact of threats to a system.
Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Buffer Overflow Attack
A type of attack that occurs when more data is written to a buffer than it can hold.
Digital Certificate
An electronic document that verifies the ownership of a public key.
SSL/TLS
Protocols designed to provide secure communication over a computer network.
VPN
Virtual Private Network, a service that encrypts your internet connection.
Access Control Models
Frameworks defining how access rights are granted to users in a system.
Qualitative Risk Analysis
Assessment method involving judgment and intuition to evaluate risks.
Cryptanalysis
The study and practice of bypassing cryptographic security systems.
Symmetric Encryption
An encryption process using the same key for both encryption and decryption.
Asymmetric Encryption
An encryption method that uses a pair of keys, one public and one private.