Intro To Security Foundations Flashcards
Someone who has access to an IT domain
User
Computer belonging to a user
Workstation
Workstations,hubs,switches, and routers
Local Area-Network (LAN)
Internet and semi-private lines
Wide Area Network (WAN)
Boundary between trusted and entrusted areas
LAN to WAN
A way to remotely access a workstation
Virtual Private Network (VPN)
Being free from danger
Security (the goal)
Measures taken to ensure safety
Security (the process)
Protection of electronic information
Information security
Only authorized parties can access information
Confidentiality
Ensure information can’t change
Integrity
Information is there for the right people when needed
Availability
Any connected device
Internet of things (IoT)
Something that compromises the confidentiality, integrity, or availability of information
Attack
An action that can cause potential harm
Threat
Someone or something that poses a threat
Threat actor
Something that makes it more likely a threat will take place
Vulnerability
The intersection of that and vulnerability
Risk
Something that has value to the organization, cannot be easily replaced, and is part of the organization’s identity
Asset