TIC: Unit 1 Flashcards

1
Q

Security

A

State of being free from danger or threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information

A

Set of organised data thar constitutes a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information security

A

Science in charge of establishing strategies managing the processes, tools and polices necessary to prevent, detect an counter threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Info just known by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Info just modified by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aviability

A

Info accesible at the time, place and form requiered by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is necessary to protect?

A

Information, hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active security

A

Measures that prevent and detect damage to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive security

A

Measures that repair or minimize damage caused to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acces control

A

Limit acces to authorized users with passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access rights

A

establishing the resources to wich each type of user can acces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure online comunication

A

Codifies important information so it can’t be deciphered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Updates

A

Maintain updated Operating Systemas and aplications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uninterruptible Power Supply (UPS)

A

Devices that provide power to the equipment thank a battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detection

A

Antivirus, Firewall, Antispyware…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active e-safety measures

A

Access control, access rights, secure online comunication, updates, UPS, detection

17
Q

Passive e-safety measures

A

Cleaning tools, backups, NAS devices, redundant systems

18
Q

Cleaning tools

A

Tools that do a complete scan of the equipment and eliminate the malware in case of infection.

19
Q

Backups

A

Restore the data using copies of the original data saved periodically.

20
Q

NAS devices

A

Systems that allow any authorized computer on the network.

21
Q

Redundant systems

A

They duplicate critical components.

22
Q

Virus

A

Infect executable files and the user doesn’t detect it.

23
Q

Worm

A

It takes advantage of system vulerabilities to mulitply and propagate. they don’t need the intervention of their victims.

24
Q

Trojan

A

Malicious code hidden inside a file.

25
Q

Trojan: Downloader

A

Downloads other malicious code.

26
Q

Trojan: Clicker

A

Seeks economic benefit through advertising.

27
Q

Trojan: Keylogger

A

Records activity performed on the keyboard.

28
Q

Trojan: Backdoor

A

Opens ports on the system.

29
Q

Trojan: Bot

A

Controls the computer remotely.

30
Q

Spyware

A

Spy program that stores personal information.

31
Q

Adware

A

Malware that installs itself taking advantage of the user accepting its terms of use.

32
Q

Ransomware

A

Application that hijacks a device and it request a payment.

33
Q

Rogue

A

Malware that simulates to be an antimalware but it causes opposite effects.

34
Q

Rootkit

A

Malware that provides remote access to the attacker.

35
Q

Protection of information

A

·Crate safe passwords
·Cryptography,
·Safe protocols
·Verifying the legitimacy of a website.

36
Q

Secure browsing

A

·Configure the browser properly
·Do not acces dubious websites and avoid sucpidius links
·Accept only the desired cookies
·Protect personal data
·Only download application form official websites
·Update your operating system and its applications