Basics K Flashcards

1
Q

is largely the practice of preventing unauthorized access to data.

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when an actor gains access to the data that they do not have the permission to

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

often employed to help an attacker gain access to a system

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The practice of keeping information secret.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an assurance that data has not been corrupted or purposefully tampered with

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a system should remain up and running to ensure that valid users have access to the data when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of confirming someone’s identity, requires not only something you know, but something you have.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keeping track of which resources an entity has access to.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Noting in a log file, tracking the usage of resources.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is meant as more of a guide for how you make use of automation

A

Dont, Repeat, Yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Someone who works hard at a problem on a computer and gains unauthorized access to data.

A

Hacker culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These hackers are typically employed by a company to test the security of their systems

A

White hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operated outside the bounds of the law and as such are subject to prosecution

A

Black hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operates illegally but ultimately wants to improve the security of the system.

A

Gray hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Individual hackers working together

A

Anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Individual hackers working together

A

Anonymous