Section 1 : Overview Of Security Flashcards
Information Security :
Protecting data info from unauthorized access, unlawful modification, corruption, and destruction
Information systems security
Protecting the systems that holds and processes data
What do the three A’s stand for in “AAA of security”?
Authentication
Authorization
Accounting
Authentication
Persons identity established with proof
Authorization
Person is given access
Accounting
Tracking of data, computer usage, network resources
What does “CIA” triad stand for?
Confidentiality
Integrity
Availability
Non-repudiation
When a user cannot deny if the other persons has a proof of a breach
Malware
“Malicious software”
Ex : viruses, worms, spyware
Unauthorized access
Occurs when access to computer resources and data happens without consent
System failure
When a computer / app crashes or fails
Social engineering
Act of manipulating users into revealing confidential info or preforming other detrimental actions
What are 3 types of mitigating threats?
Physical
Technical
Administrative
White hats
Non malicious
Attempt to break in at their request
Usually works for the company/ do as a service
Usually ethical hacker / penetration hacker
Black hats
Malicious
Break into systems without permission
“Bad guys”