TIC: Unit 1 Flashcards
Security
State of being free from danger or threat.
Information
Set of organised data thar constitutes a message.
Information security
Science in charge of establishing strategies managing the processes, tools and polices necessary to prevent, detect an counter threats.
Confidentiality
Info just known by authorized users.
Integrity
Info just modified by authorized users.
Aviability
Info accesible at the time, place and form requiered by the user.
What is necessary to protect?
Information, hardware and software.
Active security
Measures that prevent and detect damage to computer systems.
Passive security
Measures that repair or minimize damage caused to computer systems.
Acces control
Limit acces to authorized users with passwords.
Access rights
establishing the resources to wich each type of user can acces.
Secure online comunication
Codifies important information so it can’t be deciphered.
Updates
Maintain updated Operating Systemas and aplications.
Uninterruptible Power Supply (UPS)
Devices that provide power to the equipment thank a battery.
Detection
Antivirus, Firewall, Antispyware…
Active e-safety measures
Access control, access rights, secure online comunication, updates, UPS, detection
Passive e-safety measures
Cleaning tools, backups, NAS devices, redundant systems
Cleaning tools
Tools that do a complete scan of the equipment and eliminate the malware in case of infection.
Backups
Restore the data using copies of the original data saved periodically.
NAS devices
Systems that allow any authorized computer on the network.
Redundant systems
They duplicate critical components.
Virus
Infect executable files and the user doesn’t detect it.
Worm
It takes advantage of system vulerabilities to mulitply and propagate. they don’t need the intervention of their victims.
Trojan
Malicious code hidden inside a file.
Trojan: Downloader
Downloads other malicious code.
Trojan: Clicker
Seeks economic benefit through advertising.
Trojan: Keylogger
Records activity performed on the keyboard.
Trojan: Backdoor
Opens ports on the system.
Trojan: Bot
Controls the computer remotely.
Spyware
Spy program that stores personal information.
Adware
Malware that installs itself taking advantage of the user accepting its terms of use.
Ransomware
Application that hijacks a device and it request a payment.
Rogue
Malware that simulates to be an antimalware but it causes opposite effects.
Rootkit
Malware that provides remote access to the attacker.
Protection of information
·Crate safe passwords
·Cryptography,
·Safe protocols
·Verifying the legitimacy of a website.
Secure browsing
·Configure the browser properly
·Do not acces dubious websites and avoid sucpidius links
·Accept only the desired cookies
·Protect personal data
·Only download application form official websites
·Update your operating system and its applications