Pre Final Exam 360 Flashcards
Definition: Information Security Management
An integrated, systematic approach that coordinates people, policies, standards, processes, and controls used to safeguard critical systems and information from internal and external security threats
Confidentiality
Information is not accessible to unauthorized individuals or processes
Integrity
Information is accurate and complete
Availability
Information and systems are accessible on demand
Definition:Virus
A self-replicating program that runs and spreads by modifying other programs or files
Definition:Worm
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
Definition:Trojan horse
A non-self-replicating program that seems to have a useful purpose in appearance, but in reality has a different, malicious purpose
Definition:Spam
Sending unsolicited bulk information
Definition:Botnet (Bot)
A collection of software robots that overruns computers to act automatically in response to the bot-herder’s control inputs through Internet.
Definition:Denial-of-service (DoS)
The prevention of authorized access to resources (such as servers) or the delaying of time-critical operations
Definition:Spyware
Software secretly installed into an information system to gather information on individuals or organizations without their knowledge of; a type of malicious code
Definition:Spoofing
Sending a network packet that appears to come from a source other than its actual source
Definition:Social engineering
Manipulating someone to take certain action that may not be in that person’s best interest such as revealing confidential information or granting access to physical assets, networks, or information.
Definition: Encryption
Preventive control providing confidentiality and privacy for data transmission and storage
Plaintext is encrypted into _______
cyphertext
Symmetric Key Encryption : General Info
Fast and used for large data sets
the sender and the receiver use the same key to encrypt and decrypt messages
Require one key for every set of users
Asymmetric Key Encryption : General Info
slow and is not appropriate for encrypting large data sets
uses a public and private key
AKA public-key encryption or two-key encryption
Definition:Authentication
Process that establishes the origin of information or determines the identity of a user, process, or device. KEY IN E-BUSINESS
Common Use of encryption
Use asymmetric key to authenticate then use a symmetric or session key
Get the info with a public key and decrypt with private key
Definition:digital signature
a message digest (MD) of a document (or data file) that is encrypted using the document creator’s private key
Why do we use a digital signature
ensure data integrity and prevent repudiation of
transactions the digital signature also authenticates the document creator
Definition:Certificate Authority (CA)
a trusted entity that issues and revokes digital certificates