Chapter 8: Security Flashcards
To ensure that that the user can only access the information resources that are appropriate. It determines which users can authorized to read, modify, add, and/or delete information.
Access Control
An acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used.
Acceptable Use Policies (AUP)
Which identifies a list of users who have the capability to take specific actions with an information resource such as data files. Specific permissions are assigned to each user such as read, write, delete, or add. Only users with those permissions are allowed to perform those functions.
ACL
Are software that can be installed on a computer or network to detect and remove known malicious programs like viruses, and spyware. While …provide some protection they are a reactive defense in that they must first understand what to look for.
Antivirus Programs
Making sure a person is who they say they are. Three factor identification: Identifying someone: something they know, something they have, or something they are.
Authentication
That information can be accessed and modified by anyone authorized to do so in appropriate timeframe.
Availability
The procedure for making extra copies of data in case the original is lost or damaged.
Backup
A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. Example, a fingerprint scan.
Biometric Authentication
Protecting information, to be able to restrict access to only those who are allowed to see it.
Confidentiality
(Also referred to as computer crime) is an illegal activity that is committed with the use of a computer, or where a computer is the object of the crime.
Cybercrime
Attack does exactly what the term suggests: it prevents a web server from servicing authorized users.
Denial-of-Service (DoS)
One of the most common ways thieves steal corporate information is the theft of employee laptops while employees are traveling. Employees should be trained to secure their equipment whenever they are away from the office.
Employee Training
The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
Encryption
An organization’s servers and other high value equipment should always be kept in a room that is monitored for temperature, humidity, and airflow. The risk of a server failure rises when these factors exceed acceptable ranges
Environmental Monitoring
A software program or hardware device that is used to increase security on its network by blocking unwanted messages/data.
Firewall