Erstellt von Shantal K Green
vor mehr als 4 Jahre
|
||
Frage | Antworten |
Confidentiality | means that data, objects and resources are protected from unauthorized viewing and other access |
Integrity | means that data is protected from unauthorized changes to ensure that it is reliable and correct |
Availability | means that authorized users have access to the systems and the resources they need |
CIA | Confidentiality, Integrity, Availability |
Principle of Least Privilege | (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work |
Social Engineering | the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes |
Attack Surface | a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment |
Attack Surface analysis | an assessment of the total number of exploitable vulnerabilities in a system or network or other potential computer attack target. IT security workers and hackers both use it to detect security weaknesses in a system |
Threat Modeling | a computer security optimization process that allows for a structured approach while properly identifying and addressing system threats. The process involves systematically identifying security threats and rating them according to severity and level of occurrence probability |
Physical Security | the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism |
Computer Security | -allows you to use the computer while keeping it safe from threats -can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware |
Removable Devices | -any type of storage device that can be removed from a computer while the system is running -examples include CDs, DVDs and Blu-Ray disks, as well as diskettes and USB drives |
Removable Drives | USB drive CD, DVD, hard disk or floppy disk |
Access Control | a security technique that regulates who or what can view or use resources in a computing environment |
Physical Access Control | limits access to campuses, buildings, rooms and physical IT assets |
Logical Access Control | limits connections to computer networks, system files and data |
Mobile Device Security | the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. It is also known as wireless security. |
Keyloggers | a type of surveillance software that once installed on a system, has the capability to record every keystroke made on that system. The recording is saved in a log file, usually encrypted |
Internet Security | a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the process, it prevents attacks targeted at browsers, network, operating systems, and other applications |
SSID | service set identifier -the technical term for a network name. - on a wireless home network, you give it a name to distinguish it from other networks. You'll see this name when you connect your computer to your wireless network. WPA2 is a standard for wireless security |
MAC Filtering | allows you to define a list of devices and only allow those devices on your Wi-Fi network |
Security Network Key | a kind of network password or the passphrase in the form of physical, digital signature or biometric data password that is used to provide authorization and accessibility to the wireless network or device on which the client requests to connect with |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.