Cyberscurity Awareness Flashcards
How secure the IPO of data
Cyber security
How secure connections are
Network security
Focuses on keeping software devices free of threats
Application security
Protects the integrity and privacy of data both in storage and transit
Information security
Processes and decisions for handling and protecting data assets
Operational security
Define how an organization responds to s cyber security incident
Disaster recovery
Addresses the most unpredictable cyber security factor
End user education
CIA triad where who is concerned should be the only one with access
Confidentiality
CIA triad where maintaining the accuracy consistency and trustworthiness of data
Integrity
CIA triad where authorized individuals are able to access data wherever they are
Availability
Network security device that monitors incoming and outgoing network traffic and decides whether to allow or block it
Firewall
Person who breaks into computer system
Hackers
Anything that can compromise confidentiality, integrity of an information system
Threats
Any weakness in the IT Infrastructure that hackers can exploit
Vulnerability
Malicious software
Malware
Computer codes that perform malicious attacks
Virus
Doesnt need a host
Worms
Computer programs that hide their true nature and reveal their designed behavior only when activated
Trojan horse
Sending fake emails that appear to come from a trustworthy source
Phishing
Encrypts a victims files and demands ransom payment
Ransomware
Overload a website service with traffic, making it inaccessible
Distributed denial of service attacks
Eavesdropping attack
Man in the middle attack
Intruders sneak into a system and remain undetected for a long period of time
Advanced persistent threats
Processes and tools designed and deployed to protect sensitive business info
Information security