Deck 1 Flashcards
The process of granting or denying specific requests to: i) obtain and use information or related systems or services; or ii) enter specific physical facilities.
Access Control
A person who is responsible for managing a computer system or network.
Administrator
Unlike regular user accounts, administrator accounts have full privileges and can perform tasks such as modifying computer hardware and software settings and managing user accounts. Some systems may refer to administrators as having “root” or “elevated” access.
Administrator Account
A program designed to detect many forms of malware (e.g., viruses and spyware) and prevent them from infecting computers. It may also cleanse already-infected computers.
Antivirus/Anti-malware software
Verifying the identity of a user, process, or system, often as a prerequisite to allowing access to resources in an information system.
Authentication
Timely, reliable access to data, information, and systems by authorized users.
Availability
A copy of information, files, and programs to facilitate recovery. Backups may be stored on the same machine that contains the original information, another machine, a storage device such as a thumb drive, or “in the cloud.”
Backups
A wireless protocol that allows two similarly equipped devices to communicate with each other within a short distance (e.g., 30 ft.). “Bluetooth-enabled” means that nearby devices can communicate with each other without a physical connection. Examples of Bluetooth-enabled devices include cell phones, portable wireless speakers, and wireless headphones.
Bluetooth
A scam that targets businesses by using social engineering or computer intrusion to compromise legitimate business email accounts and conduct unauthorized fund transfers or obtain personal information.1
Business Email Scams
A scam that targets businesses by using social engineering or computer intrusion to compromise legitimate business email accounts and conduct unauthorized fund transfers or obtain personal information.1
Business Email Scams
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Confidentiality
Criminal offenses committed on the internet or aided by the use of computer technology.2
Cyber Crime
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or that constitutes a violation or imminent threat of violating security policies, security procedures, or acceptable use policies.
Cyber Incident/Cyber Breach
Cyber InsuranceInsurance that is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage.3
Cyber Insurance
An approach or series of steps to prevent or manage the risk of damage to, unauthorized use of, exploitation of, and—if needed—to restore electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, integrity, and availability of these systems.
Cybersecurity