Cyberscurity Awareness Flashcards
How secure the IPO of data
Cyber security
How secure connections are
Network security
Focuses on keeping software devices free of threats
Application security
Protects the integrity and privacy of data both in storage and transit
Information security
Processes and decisions for handling and protecting data assets
Operational security
Define how an organization responds to s cyber security incident
Disaster recovery
Addresses the most unpredictable cyber security factor
End user education
CIA triad where who is concerned should be the only one with access
Confidentiality
CIA triad where maintaining the accuracy consistency and trustworthiness of data
Integrity
CIA triad where authorized individuals are able to access data wherever they are
Availability
Network security device that monitors incoming and outgoing network traffic and decides whether to allow or block it
Firewall
Person who breaks into computer system
Hackers
Anything that can compromise confidentiality, integrity of an information system
Threats
Any weakness in the IT Infrastructure that hackers can exploit
Vulnerability
Malicious software
Malware