Midterm Lesson 2 Flashcards
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.
A typical method for authentication over internet is via _______ and ________.
username; password
It is a password which can be used one time only and is sent to the user as an SMS or an email at the mobile number/email address that they have specified during the registration process.
One Time Password (OTP)
It is known as two-factor authentication method and requires two type of evidence to authentication an individual to provide an extra layer of security for authentication. Some other popular techniques for two-way authentication are: biometric data, physical token, etc. which are used in conjunction with username and password.
One Time Password (OTP)
It is a technique to convert the data in unreadable form before transmitting it over the internet. Only the person who have the access to the key and convert it in the readable form and read it.
Encryption
To avoid the transfer of key a method called ________, also known as public key encryption, is used.
asymmetric key encryption
It is a technique for validation of data. Validation is a process of certifying the content of a document.
Digital Signatures
The __________ is created by encrypting the data with the private key of the sender.
digital signature
A special program called an _______ is used which is designed to protect the system against virus. It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is already installed into the system.
anti-virus
It is a hardware/software which acts as a shield between an organization’s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you.
Firewall
There are two type of traffic in an organization: ________ traffic and _____ traffic.
inbound traffic and outbound traffic.
Example of this are routers through which the network is connected to the network outside the organization i.e. Internet.
hardware firewalls
These firewalls are installed and installed on the server and client machines and it acts as a gateway to the organizations‟ network.
Software Firewalls
All the outbound traffic is routed through proxies for monitoring and controlling the packet that are routed out of the organization.
Proxy
Based on the rules defined in the policies each packet is filtered by their type, port information, and source & destination information.
Packet Filtering
Rather than going through all the field of a packet, key features are defined. The outgoing/incoming packets are judged based on those defined characteristics only.
Stateful Inspection
It is a technique of hiding secret messages in a document file, image file, and program or protocol etc. such that the embedded message is invisible and can be retrieved using special software.
Steganography
True or False:
In steganography, only the sender and the receiver know about the existence of the secret message in the image. The advantage of this technique is that these files are not easily suspected.
True
The _______ acts as a fundamental system in case of a mishap where data is inadvertently lost or corrupted from original system.
backup system
It involves a set of policies and procedures to preserve continuation of business in case of a disaster.
Disaster recovery
A ______ may refer to a natural hazard or due to manual error or machine failure.
disaster
Methods on Backup and DR of data:
Data is backed up on a full-scale and recovered back from the same.
Full back up
Methods on Backup and DR of data:
Only changed or newly added data is backed up subsequently after the last full or incremental backup. Recovery is made with help of last full backup and all incremental backups performed everyday from the date of last full backup.
Incremental backup
Methods on Backup and DR of data:
Only changed or newly added data is backed up subsequently after last full or differential backup but changes made in the previous differential backup are updated in next differential backup. This makes recovery process easier, which only requires data from last full backup and last differential backup copies
Differential backup