Deck 1 Flashcards

1
Q

The process of granting or denying specific requests to: i) obtain and use information or related systems or services; or ii) enter specific physical facilities.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A person who is responsible for managing a computer system or network.

A

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unlike regular user accounts, administrator accounts have full privileges and can perform tasks such as modifying computer hardware and software settings and managing user accounts. Some systems may refer to administrators as having “root” or “elevated” access.

A

Administrator Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A program designed to detect many forms of malware (e.g., viruses and spyware) and prevent them from infecting computers. It may also cleanse already-infected computers.

A

Antivirus/Anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Verifying the identity of a user, process, or system, often as a prerequisite to allowing access to resources in an information system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Timely, reliable access to data, information, and systems by authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A copy of information, files, and programs to facilitate recovery. Backups may be stored on the same machine that contains the original information, another machine, a storage device such as a thumb drive, or “in the cloud.”

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A wireless protocol that allows two similarly equipped devices to communicate with each other within a short distance (e.g., 30 ft.). “Bluetooth-enabled” means that nearby devices can communicate with each other without a physical connection. Examples of Bluetooth-enabled devices include cell phones, portable wireless speakers, and wireless headphones.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A scam that targets businesses by using social engineering or computer intrusion to compromise legitimate business email accounts and conduct unauthorized fund transfers or obtain personal information.1

A

Business Email Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A scam that targets businesses by using social engineering or computer intrusion to compromise legitimate business email accounts and conduct unauthorized fund transfers or obtain personal information.1

A

Business Email Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Criminal offenses committed on the internet or aided by the use of computer technology.2

A

Cyber Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or that constitutes a violation or imminent threat of violating security policies, security procedures, or acceptable use policies.

A

Cyber Incident/Cyber Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber InsuranceInsurance that is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage.3

A

Cyber Insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An approach or series of steps to prevent or manage the risk of damage to, unauthorized use of, exploitation of, and—if needed—to restore electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, integrity, and availability of these systems.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An incident that involves sensitive, protected, or confidential information being copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so. Exposed information may include credit card numbers, personal health information, customer data, company trade secrets, or matters of national security, for example.4

A

Data breach

17
Q

The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.

A

Digital Forensics

18
Q

A security incident that occurs when a user unknowingly visits an infected/compromised website and malware is downloaded and installed without their knowledge.5

A

Drive-by-Download

19
Q

The transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its original state.

A

Encryption

20
Q

A device or program that restricts data communication traffic to or from a network and thus protects that network’s system resources against threats from another network.

A

Firewall

21
Q

Someone who attempts to or gains access to an information system, usually in an unauthorized manner. A “white hat” hacker is a cybersecurity specialist who breaks into systems with a goal of evaluating and ultimately improving the security of an organization’s systems.

A

Hacker

22
Q

A common connection point for devices in a network. Hubs commonly are used to pass data from one device (or network segment) to another.

A

Hub

23
Q

Crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, often for economic gain.6

A

Identity Theft

24
Q

The approach to protect and manage the risk to information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

A

Information Security

25
Q

A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored.

A

Integrity