1.1.3 Test out Notes Flashcards
Security
the degree of protection against danger, damage, loss, and criminal activity
Sophisticated Attacks
Complex so they are difficult to detect, blends into regular internet traffic to avoid detection.
Proliferation of Attack Software
Variety of attack tools found on the internet that are as simple as downloading and choosing target.
Attack Scale and Velocity
Attacks on computers can be from hundreds to millions by just existing on the internet, this is because attacks have grown past just being physical.
Confidentiality
Confidentiality ensures that data is not disclosed to unintended persons, encryption is a method of insuring confidentiality.
Integrity
ensures that data is not modified or tampered with, hashing can be used to achieve this
Availability
Ensures the uptime of a network and systems ready when needed.
Non-repudiation
The confirmation of a messages source, digital signatures are used.
Physical Security
includes all hardware and software needed to secure data, firewalls and anti virus softwares
Users and Administrators
Users and administrators are the people who use the software and the people who manage the software
Policies
Rules a company may use to protect information and keep it secure
Risk Management
Steps of indentifying security problems and choosing what things to do to counter future attacks.
Asset
Something that holds value to a person or company
Threat
A entity that can cause damage to a company by exposing or stealing assets worth value or confidential.
Threat Agent
The person who causes or creates an attack, could be a disgruntled employee tired of dealing with the company.