1.1 Basic Concepts Flashcards
These terms are the building blocks for further study.
Confidentiality
Ensures that sensitive information is accessible only to authorized individuals or entities. Involves protecting data from unauthorized access, disclosure, or exposure.
Integrity
Ensures that data remains accurate, complete, and unaltered during storage, transmission, or processing. Guards against unauthorized modification or tampering.
Authorization
Determines the level of access or privileges granted to authenticated users or entities. Ensures users can only access the resources they are authorized to use
Availability
Ensures systems, networks, and data are accessible and operational when needed. Measures are taken to prevent disruptions or denial-of-service attacks that could render resources unavailable.
Authentication
Verifies the identity of users or devices attempting to access a system. Confirms individuals or entities are who they claim to be before granting access.
Non-Repudiation
Prevents individuals from denying their actions or transactions. Ensures that actions, such as data exchange or digital signatures, are verifiable and cannot later be denied.
Vulnerability
A weakness or flaw in a system, application, or process that could be exploited by attackers to gain unauthorized access or cause harm.
Threat
Any potential danger or harmful event that could exploit vulnerabilities and compromise security. Threats can be internal or external.
Risk
The likelihood of a threat exploiting a vulnerability and the potential impact of that occurrence. Cybersecurity exists to mitigate risks.
Malware
Malicious software designed to harm, steal, or disrupt systems or data. Includes viruses, worms, trojans, ransomeware, or spyware.
Phishing
Social engineering technique where attackers impersonate trusted people or entities to trick individuals into revealing sensitive information.
Firewall
A security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks.
Encryption
The process of converting data into a secure code to protect it from unauthorized access. Only those with the decryption key can access the original data.
Patch
A software update released by vendors to fix security vulnerabilities and improve functionality. Regularly applying patches helps protect against known threats.
Incident Response
The process of identifying, managing, and mitigating the impact of a cybersecurity incident or breach to minimize damage and recover quickly.