Lesson 1 Flashcards
Defense In Depth
Strategies that Make a Computer Environment more Safe
Information Security’s Main Goal
Prevent Loss
Security Controls
Mechanisms used to Protect Information
CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
The Assurance Information Cannot be Accessed by Unauthorized Users
Integrity
The Assurance Information Cannot be Changed by Unauthorized Users
Availability
Information is Available to Authorized Users in a Timely Manner
IT Infrastructure
The Collection of Devices that make up the IT Environment
Thin Client
Computer Resources are Stored and Accessed from a Central Server
Thick Client
Computing Resources are Stored Locally
EULA
End User License Agreement
Risk
Any Exposure to a Threat
Threat
Any Action that could lead to Damage, Disruption, or Loss
Vulnerability
A Weakness in an OS or Application Software
SIEM
Security Information & Event Management (Tools)