Overview of Security Objs Flashcards
3 A’s of security
Authentication Authorization
Accounting
Authentication
When a persons identity is established with proof and confirmed by a system
Authorization
Occurs when a user is given access to a certain piece of data or certain areas of a building
Accounting
Tracking of data, computer usage, and network resources
Malware
Malicious Software
Unauthorized Access
Occurs when access to computer resources and data happens without the consent of the owner
System Failure
When a computer crashes or a application fails
Social Engineering
Act of manipulating users into revealing confidential information or preforming other detrimental actions
Physical Controls
Alarm systems, Locks, Surveillance cameras, ID Cards, security guards ect.
Technical Controls
Smart cards, Encryption, access control lists (ACLs), intrusion detection systems, and network authentication
Administrative controls
Policies, procedures, security awareness training, contingency planning, and disaster recovery plans
White Hat Hacker
Non-Malicious Hackers who attempt to break into a company’s system at their request
Black Hat Hacker
Malicious Hackers who break into computer systems and networks without authorization or permission
Gray Hat Hacker
Hackers with no affiliation to a company that attempts to break into a company’s network and risks breaking the law
Script Kiddies
Hackers with little to no skill who only use the tools and exploits written by others (Bottom of threat actors)