Basics K Flashcards
is largely the practice of preventing unauthorized access to data.
Information security
when an actor gains access to the data that they do not have the permission to
Unauthorized access
often employed to help an attacker gain access to a system
Malware
The practice of keeping information secret.
Confidentiality
an assurance that data has not been corrupted or purposefully tampered with
Integrity
a system should remain up and running to ensure that valid users have access to the data when needed.
Availability
The process of confirming someone’s identity, requires not only something you know, but something you have.
Authentication
Keeping track of which resources an entity has access to.
Authorization
Noting in a log file, tracking the usage of resources.
Accounting
This is meant as more of a guide for how you make use of automation
Dont, Repeat, Yourself
Someone who works hard at a problem on a computer and gains unauthorized access to data.
Hacker culture
These hackers are typically employed by a company to test the security of their systems
White hats
Operated outside the bounds of the law and as such are subject to prosecution
Black hats
Operates illegally but ultimately wants to improve the security of the system.
Gray hats
Individual hackers working together
Anonymous