Security Definitions Flashcards
What is Information Security
Protection of info and resources from unauthorized access, attacks, thefts. or data
What is Risk
Concept that indicates exposure to the chance of damage or loss
What is a Threat
event or action that could potentially cause damage to asset
What is a Vulnerability
Condition that leaves system open to harm
What are Intrusions
attacker accesses computer system without the authorization to do so
What are Attacks
exploit vulnerability in application or physical computer system without authorization to do so
What are Controls
Countermeasures that you need to put in place to avoid, mitigate, or counteract security risks
What is Non-Repudiation
party remains associated with data they created or transferred
What is Identification
Ensuring the entity requesting access is true
What is Authentication
method of validating particular entity credentials
What is Authorization
determining rights and privileges of entity
What is Access Control
Determining and assigning privileges to various resources, objects or data
What is Accounting
Tracking/ recording system activities
What is Auditing
examining logs of what was recorded
What is Implicit Deny
not explicitly allowed is denied
What is Least Privilege
user and software only access what they need
What is Privilege Bracketing
given at beginning and taken away at end
What is Separation of Duties
no one person has to much power of responsibility
What is Job Rotation
no one stays in one job to long
What is Mandatory Vacation
opportunity to review employee’s activities
What are Time of Day Restrictions
What times users are allowed access
What are Orphaned Accounts
user accounts remain active after employee has left
What is Privilege Management
administration of user and group access control
What is Cryptography
science of hiding info
What is Encryption
converts data from plaintext to ciphertext
What is Decryption
converts ciphertext to plaintext
What is Quantum Cryptography
encryption based on quantum communication
What are Ciphers
algorithm used to encrypt or decrypt data
What is Steganography
hides info by hiding it in another file
What are Keys
specific piece of info used to encrypt and decrypt
What is Hashing Encryption
one-way encryption that transforms cleartext to ciphertext, not to be decrypted
What is Symmetric Encryption
two-way encryption which both encrypt and decrypt use same key
What is asymmetric encryption
using public and private keys
What is a Key Exchange
keys transferred among users
What is a Digital Signature
message digest that has been encrypted again with user’s private key
What are Cipher Suites
Collection of algorithms used to establish secure connection
What are Session Keys
Single-use key used for encrypting messages in a single series
What is Key Stretching
Technique to strengthen weak cryptographic keys
What are Social Engineering Attacks
uses deception and trickery to obtain data
What is Spoofing
human or software attack to pretend to be someone else
What is Impersonation
Human attack pretends to be someone else
What is a Hoax
email attack using trickery to convince user to delete stuff
What is Phishing
Email attack pretending to be a respected company
What is vishing
Human attack to get info over phone
What s Whaling
targets wealthy people and organizations
What is URL hijacking
exploits typos in URL address
What is Spam/ Spim
email attack floods inbox to deliver virsus. Spim is instant messenger
What is shoulder surfing
someone looking over your shoulder to get info
What is dumpster diving
looking in trash for info
What is Tailgating
walking through portal behind someone
What is a Electronic Activist
wants social change
What is a data thief
blatantly steal resources
What is a Script Kiddie
Novice looking to improve skill
What is Electronic Vandal
do as much damage as possible
what is a Cyberterrorist
disrupt system spread fear and panic
What is a Malicious Code Attack
software attack where undesired software is inserted
What is a Viruses
Code that spreads by attaching itself
What is a Worm
Replicates itself but doesn’t attach
What is Adware
software that downloads unwanted ads