IDENTIFICATION Flashcards
PRELIM
It is a specialized framework designed to integrate security into every phase of the traditional systems development life (SDLC)
Security Systems Development Life Cycle (SecSDLC)
Is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destructions
Information Security
Ensuring that information is accessible only to authorized individuals.
CONFIDENTIALITY
Maintaining the accuracy and completeness of information.
INTEGRITY
Ensuring that information is accessible when needed by authorized users.
AVAILABILITY
Attempts to trick users into revealing sensitive information.
Phishing
Malicious software such as viruses, worms, and trojans
Malware
Overwhelming a system with traffic to make it unavailable.
Distributed Denial of Service (DDos) attack
Injecting malicious SQL code into a web application.
SQL Injection
Manipulating people to gain unauthorized access.
Social Engineering Attack
Transforming data into a code to protect its confidentiality.
Encryption
Network Security devices that filter traffic.
Firewalls
Limiting access to information based on user roles and permissions.
Access Control
Monitoring networks for suspicious activity
Operations and Maintenance Phase
Creating copies of data to restore in case of loss.
backup