Chapter 1- Mastering Security Basics Flashcards
Confidentiality
Prevents the unauthorized disclosure of data
Identification
Users claim an identity with a unique username
Authentication
Users prove their identity with authentication such as with passwords
Authorization
You can grant or restrict access to resources using authorization method such as permission
Steganography
It is the practice of hiding data within data
Obfuscation
Methods attempt to make something unclear or difficult to understand
Integrity
Provides assurance that data has not change
Hash
Simply a number created by executing a hashing algorithm against data, such as a file or message
Digital Signature
Verify the integrity of emails and files and they also provide authentication and non-repudiation.
Redundancy
Adds duplication to critical systems and provides fault tolerance
Encryption
Scrambles data to make it unreadable by unauthorized personnel
Risk
The possibility or likelihood of a threat exploiting a vulnerability result in a loss
Security incident
Adverse event or series of event that can negatively affect confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data
Threat
Circumstances or event that has the potential to compromise confidentiality, integrity or availability
Intentional attack
Malicious software (malware) infections and accidental data loss