Computer Security Overview

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key terms and concepts in computer security, including definitions and clarifications.

Last updated 9:49 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

CIA

Confidentiality, Integrity, Availability.

2
New cards

Confidentiality

Prevention of unauthorized disclosure of information.

3
New cards

Integrity

Prevention of unauthorized modification of information.

4
New cards

Availability

Prevention of unauthorized withholding of information or resources.

5
New cards

Security Policy

Rules that determine which events are allowed or not allowed in the system.

6
New cards

Vulnerability

Weaknesses that allow harm to occur.

7
New cards

Intrusion

A successful event from the attacker exploiting a vulnerability.

8
New cards

Breach

Violation of the explicit or implicit security policy.

9
New cards

Risk

The possibility of a vulnerability being exploited.

10
New cards

Threat

Any person or event that threatens the CIA.

11
New cards

Countermeasures

Actions that reduce vulnerability.

12
New cards

CCPA

California Consumer Privacy Act; gives the right to know what information is being collected.

13
New cards

Criminal Groups

Organized crime entities seeking monetary gain.

14
New cards

Nation-State Actors

Governments conducting espionage and influence operations.

15
New cards

Hacktivists/Leakivists

Politically motivated hackers or leakers.

16
New cards

Ransomware

A type of malware that encrypts files to extort ransom.

17
New cards

Defense in Depth

Multi-layered approach to security protection.

18
New cards

Zero Trust

Security model that requires continual verification of trust.

19
New cards

Symmetric Key System

Encryption method using the same key for both encryption and decryption.

20
New cards

Asymmetric Key System

Encryption method using a pair of keys (public and private).

21
New cards

Cryptographic Hash Functions

Functions that convert data into a fixed size and are deterministic.

22
New cards

Hashing

A one-way process that verifies data integrity.

23
New cards

NIST Cyber Security Framework

Guides organizations in managing and mitigating cybersecurity risks.

24
New cards

Govern (NIST function)

Establish organizational risk management strategy and expectations.

25
New cards

Identify (NIST function)

Develop understanding of managing risks to assets and data.

26
New cards

Protect (NIST function)

Implement safeguards against identified risks.

27
New cards

Detect (NIST function)

Identify risks through continuous monitoring.

28
New cards

Respond (NIST function)

Actions taken when a cybersecurity incident occurs.

29
New cards

Recover (NIST function)

Activities to restore assets and operations after a cybersecurity incident.