ITEC 85 Flashcards
refers to the protection of information and information systems from unauthorized access
INFORMATION SECURITY
– refers to broader to a set of practices, policies, and procedures aimed at protecting the confidentiality
INFORMATION ASSURANCE
to hide a glaze recipe for pottery.
CRYPTOGRAPHY IN ANCIENT TIME
Firewalls
MEDIEVAL CASTLE
Codes
WORLD WARR ll AND THE ENIGMA MACHINE
– it is responsible for creating, managing, and using data
PEOPLE
is refer to the activities and procedures that are used to collect, store, process, and distribute information
- PROCESSES
is the raw material that is used by the information system
DATA
refers to the computer programs
- SOFTWARE
refers to the physical components of the information system
- HARDWARE
component of an information system includes the communication infrastructure
- NETWORKING
The birth of modern computing led to the development of computers
BIRTH OF MODERN COMPUTING AND EARLY THREATS
It is important elements of information security that help protect computer systems
PASSWORD AND ACCESS CONTROLS
refers to the time when the internet became widely accessible
INTERNET ERA
It is an effort to enhance information security
TRUSTED COMPUTING INITIATIVE
It is also known as asymmetric cryptography, is a method used in information security to secure communication
- PUBLIC – KEY CRYPTOGRTAPHY
refers to the increase in criminal activities that are conducted through the use of computers
- THE RISE OF CYBECRIME
refers to the protection of mobile devices
- MOBILE SECURITY
refers to the protection of data
cloud computing environments
- CLOUD SECURITY
refers to the measures and practices implemented to protect the security
- INTERNET OF THINGS (IoT) SECURITY
are sophisticated and targeted cyber-attacks that are carried out by skilled and persistent adversaries.
- ADVANCED PERSISTENT THREATS (APTs)
was an early computer worm that spread rapidly through vulnerable
- THE MORRIS WORM
refers to the measures and practices implemented to protect the security
- INTERNET OF THINGS (IoT) SECURITY
it pertains to laws and regulations that govern the protection and privacy of personal data.
- DATE PRIVACY REGULATIONS