Lesson 3 Flashcards
is the concealment of information or resources.
There is a need to keep information secret from other third parties.
CONFIDENTIALITY
is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes.
INTEGRITY
refers to the ability to access data of a resource when it is needed, such as the information has value only if the authorized people can access at right time.
AVAILABILITY
is when someone gains access to a server, website, or other sensitive data using someone else’s account details.
UNAUTHORIZED ACCESS
1.
Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
HACKER
Is an action or event that might compromise the security.
THREAT
It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
VULNERABILITY
Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
ATTACK
Is a software that operates on different OS which is used to prevent from malicious software.
ANTIVIRUS
or
ANTIMALWARE
Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
SOCIAL ENGINEERING
It is a malicious software that installs on your computer without your consent for a bad purpose.
VIRUS
It is a software or hardware which is used to filter network traffic based on rules.
FIREWALL
iswhat encryption algorithms, or ciphers, transform an original message into.
Clue: Character sa FL
CIPHER TEXT
integrity refers to the accuracy, consistency, and reliability of data over its entire lifecycle.
DATA INTEGRITY
Malicious software, such as viruses, worms, and Trojans, can infect systems and corrupt or steal data.
MALWARE
AND VIRUSES
Unauthorized access to sensitive data by hackers or insiders can lead to data theft, manipulation, or exposure.
DATA BREACHES
Mistakes made by employees or users, such as accidental data deletion or improper data entry, can compromise data integrity.
HUMAN ERROR
Hardware components, including hard drives and memory modules, can fail and result in data corruption or loss.
HARDWARE FAILURES
like Distributed Denial of Service (DDoS) and ransomware can disrupt data availability and lead to data loss or corruption.
CYBERATTACKS
is the process of converting data into a coded or unreadable format, known as ciphertext.
DATA ENCRYPTION
Methods of Data Encryption(3):
- Symmetric Encryption
- Asymmetric Encryption
- End-to-End Encryption
is a mathematical algorithm that takes an input (or “message”) and returns a fixed-size string of characters, which is typically a hexadecimal number.
HASH FUNCTION
They involve mechanisms and processes for verifying the identity of users and regulating their access to data, systems, or resources.
ACCESS CONTROL AND AUTHENTICATION