Data Security/ Privacy Flashcards
Authentication
A method for confirming users identities
Authorization
The process of providing a user with permission including access levels and abilities such as a file access, hours of access, and amount of allocated storage space
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Content filtering
Occur seven organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
Downtime
Refers to a period of time when a system is unavailable
Encryption
Scrambles information into an alternative form that requires a key a password to decrypt the information
Firewall
Hardware and/or software that guard a private network by analyzing incoming and out coming information for the correct markings
Hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or for the challenge
Information security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Insiders
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Intrusion detection software (IDS)
Features full-time monitoring tools that search for patterns in network traffic to identify intruders
Malicious code
Includes a variety of threats such as viruses, worms, and Trojan horses
Denial of service
Floods a website with so many requests for service that it slows down or crashes the site
Packet tampering
Consists of altering the contents of as they travel over the Internet or altering data on computer disks after penetrating a network
Phishing
A technique to gain personal information for the purpose of identify theft, usually by means of fraudulent emails that look as though they came from legitimate business