Data Security/ Privacy Flashcards
Authentication
A method for confirming users identities
Authorization
The process of providing a user with permission including access levels and abilities such as a file access, hours of access, and amount of allocated storage space
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Content filtering
Occur seven organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
Downtime
Refers to a period of time when a system is unavailable
Encryption
Scrambles information into an alternative form that requires a key a password to decrypt the information
Firewall
Hardware and/or software that guard a private network by analyzing incoming and out coming information for the correct markings
Hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or for the challenge
Information security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Insiders
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Intrusion detection software (IDS)
Features full-time monitoring tools that search for patterns in network traffic to identify intruders
Malicious code
Includes a variety of threats such as viruses, worms, and Trojan horses
Denial of service
Floods a website with so many requests for service that it slows down or crashes the site
Packet tampering
Consists of altering the contents of as they travel over the Internet or altering data on computer disks after penetrating a network
Phishing
A technique to gain personal information for the purpose of identify theft, usually by means of fraudulent emails that look as though they came from legitimate business
Social engineering
Using your social skills to trick people into revealing access credentials or other valuable information
Dumpster diving
Looking through people’s trash, another way hackers obtain information
Smart card
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
Spyware
A special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
Spoofing
The forging of the return address on an email so that the email message appears to come from someone other than the actual sender