Security: identifiying and preventing vulnerablilities Flashcards
penetration testing
Legally hacking into a system to identify vulnerabilities, ‘White hat hacking’
Anti-malware
Identifies and removes malware.
Firewalls
Controls access to a network.
Passwords
needed to pass a login screen and access an account. Passwords should be as strong as possible (use a mix of letters, numbers and symbols. Don’t use words that are in the dictionary.) so that they are not easily guessed.
Cypher
Encrypted - or ‘scrambled’ - data.
Key
The unique ‘descrambler’ used to decrypt encrypted - or
‘scrambled’ - data. Basically instruction of how to reverse encryption.
User Access Levels
Different users have access to different data. creates a ‘hierachy’ of sorts.
Encryption
‘Scrambling’ data to make it unable to read without decryption via the use of a key.
Two factor authentification
Use of more than just one system to identify that the correct user is trying to access a system. Often uses a password as well as a text sent to the user’s phone number with a unique one-time-use code.