Lesson 3 Flashcards
is the concealment of information or resources.
There is a need to keep information secret from other third parties.
CONFIDENTIALITY
is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes.
INTEGRITY
refers to the ability to access data of a resource when it is needed, such as the information has value only if the authorized people can access at right time.
AVAILABILITY
is when someone gains access to a server, website, or other sensitive data using someone else’s account details.
UNAUTHORIZED ACCESS
1.
Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
HACKER
Is an action or event that might compromise the security.
THREAT
It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
VULNERABILITY
Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
ATTACK
Is a software that operates on different OS which is used to prevent from malicious software.
ANTIVIRUS
or
ANTIMALWARE
Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
SOCIAL ENGINEERING
It is a malicious software that installs on your computer without your consent for a bad purpose.
VIRUS
It is a software or hardware which is used to filter network traffic based on rules.
FIREWALL
iswhat encryption algorithms, or ciphers, transform an original message into.
Clue: Character sa FL
CIPHER TEXT
integrity refers to the accuracy, consistency, and reliability of data over its entire lifecycle.
DATA INTEGRITY
Malicious software, such as viruses, worms, and Trojans, can infect systems and corrupt or steal data.
MALWARE
AND VIRUSES