Lesson 3 Flashcards

1
Q

is the concealment of information or resources.
There is a need to keep information secret from other third parties.

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the ability to access data of a resource when it is needed, such as the information has value only if the authorized people can access at right time.

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is when someone gains access to a server, website, or other sensitive data using someone else’s account details.

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.

Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.

A

HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is an action or event that might compromise the security.

A

THREAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.

A

VULNERABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.

A

ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a software that operates on different OS which is used to prevent from malicious software.

A

ANTIVIRUS
or
ANTIMALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.

A

SOCIAL ENGINEERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is a malicious software that installs on your computer without your consent for a bad purpose.

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is a software or hardware which is used to filter network traffic based on rules.

A

FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

iswhat encryption algorithms, or ciphers, transform an original message into.
Clue: Character sa FL

A

CIPHER TEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

integrity refers to the accuracy, consistency, and reliability of data over its entire lifecycle.

A

DATA INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software, such as viruses, worms, and Trojans, can infect systems and corrupt or steal data.

A

MALWARE
AND VIRUSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorized access to sensitive data by hackers or insiders can lead to data theft, manipulation, or exposure.

A

DATA BREACHES

17
Q

Mistakes made by employees or users, such as accidental data deletion or improper data entry, can compromise data integrity.

A

HUMAN ERROR

18
Q

Hardware components, including hard drives and memory modules, can fail and result in data corruption or loss.

A

HARDWARE FAILURES

19
Q

like Distributed Denial of Service (DDoS) and ransomware can disrupt data availability and lead to data loss or corruption.

A

CYBERATTACKS

20
Q

is the process of converting data into a coded or unreadable format, known as ciphertext.

A

DATA ENCRYPTION

21
Q

Methods of Data Encryption(3):

A
  1. Symmetric Encryption
  2. Asymmetric Encryption
  3. End-to-End Encryption
22
Q

is a mathematical algorithm that takes an input (or “message”) and returns a fixed-size string of characters, which is typically a hexadecimal number.

A

HASH FUNCTION

23
Q

They involve mechanisms and processes for verifying the identity of users and regulating their access to data, systems, or resources.

A

ACCESS CONTROL AND AUTHENTICATION

24
Q
A