M2 Computer Security Flashcards
Computer Security
Protects systems from harm, unauthorized access, and theft.
Types: Information Security, Application Security, Network Security
CIA Triad
Confidentiality, Integrity, Availability.
Confidentiality: Only authorized access. Integrity: Data remains unaltered by unauthorized users. Availability: Data accessible when needed.
Security Layers
Includes hardware, software, network, and physical protection layers.
Technical Controls
Firewalls, Secure Configuration, User Access Control, Malware Protection, Patch Management.
Firewalls: Restrict network access. Secure Configuration: Secure default setups. User Access Control: Limit access based on user role. Malware Protection: Use antivirus software. Patch Management: Regular updates for security.
Authentication Methods
Password Authentication, Token-Based Authentication, Biometric Security.
Password Authentication: Basic security, vulnerable to cracking. Token-Based Authentication: Higher security, uses physical tokens. Biometric Security: Enhanced security with unique physical traits.
Benefits of Security Awareness
Advantages of firewalls, antivirus, secure passwords, webcam surveillance, and biometric authentication. Each method comes with benefits and limitations.