Module 1 Flashcards
What is confidentiality in computer security?
The concealment of information or resources to keep them secret from unauthorized parties.
Define integrity in the context of data security.
The trustworthiness of data by preventing unauthorized and improper changes.
What does availability refer to in computer security?
The ability to access data or resources when needed by authorized users.
What is unauthorized access?
Gaining access to a server, website, or sensitive data using someone else’s account details.
Who is considered a hacker?
A person who exploits computer systems for various reasons, such as money or social causes.
What is a threat in cybersecurity?
An action or event that might compromise the security of a system.
Define vulnerability in the context of cybersecurity.
A weakness or design flaw in a system that can lead to security breaches.
What is an attack in cybersecurity?
An assault on system security delivered by a person or machine that violates security.
What is the purpose of antivirus or antimalware software?
To prevent malicious software from infecting a computer system.
What is social engineering?
A technique used by hackers to steal data through psychological manipulation.
What is a virus in computer security?
Malicious software that installs on a computer without consent for harmful purposes.
What is a firewall?
Software or hardware used to filter network traffic based on predefined rules.
List the best practices for password security.
- Don’t share passwords
- Don’t write them down
- Change them often
- Use hard-to-guess passwords
- Use a large set of characters
What is biometric identification?
A security method using unique physical characteristics, such as fingerprints or iris scans.
What is cipher text?
The result of transforming an original message using encryption algorithms.
What does public key encryption involve?
Using a public key to encrypt data and a private key to decrypt it.
What is a Virtual Private Network (VPN)?
A service that extends a private network across a public network, securing data during transmission.
What are common types of cyberattacks?
- Distributed Denial of Service (DDoS)
- Ransomware
What is data encryption?
The process of converting data into a coded format to protect it from unauthorized access.
What are the methods of data encryption?
- Symmetric Encryption
- Asymmetric Encryption
- End-to-End Encryption
What is a hash function?
A mathematical algorithm that converts input data into a fixed-size string, unique to that input.
How is password storage typically handled?
Passwords are hashed and the resulting hash is stored in the database for verification.
What is file verification?
The process of checking the hash value of a file to ensure its integrity.
What are examples of widely used hash functions?
- MD5
- SHA-1
- SHA-256