Module 2 Flashcards
Security Controls
Safeguards designed to reduce specific security risks
Types of security controls
Technical
Operational
Managerial
Information Privacy
The protection of unauthorized access and distribution of data
Principle of least privilege
The concept of granting only the minimal access and authorization required to complete a task or function
Data Owner
The person that decides who can access, edit, use, or destroy their information
Data Custodian
Anyone or anything thats responsible for the safe handling, transport, and storage of information
Personably Identifiable Information (PII)
Any information that can be used to infer an individuals identity
Cryptography
The process of transforming information into a form that unintended readers cant understand
Algorithm
A set of rules used that solve a problem
Cipher
An algorithm that encrypts information
Cryptographic Key
A mechanism that decrypts ciphertext
Brute Force Attack
A trial and error process of discovering private information
Public Key Infrastructure (PKI)
An encryption framework that secures the exchange of information online
Asymmetric Encryption
The use of a public and private key pair for encryption and decryption of data
Symmetric Encryption
The use of a single secret key to exchange information
PKI Process
Exchange of encrypted information
Establish trust using a system of digital certificates