Cloud Security Flashcards
Threat
Any potential danger or risk to the security of computer systems or data, including malware, viruses, and hackers.
Vulnerabilities:
Weaknesses or flaws in a system’s design, implementation, or security measures that can be exploited to compromise its security.
Encryption:
The process of converting plain text into coded or encrypted text to secure information and prevent unauthorized access.
Encryption typically uses a key or password to encrypt and decrypt data.
Two-factor authentication:
A security process that requires users to provide two forms of identification to verify their identity.
Typically, this involves entering a password and then providing a second authentication factor, such as a fingerprint or a code sent to a mobile device.
Single sign-on:
A system that allows users to access multiple applications or systems with a single set of login credentials.
This reduces the need for users to remember multiple passwords and can improve security by enforcing stronger authentication measures.