Unit 9 Flashcards
This is the protection of computer systems and information from harm, theft, and unauthorized use.
Computer Security
This is the act of protecting yourself and others from attacks that are carried out primarily with computers.
Cybersecurity
This is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
Network Security
This focuses on keeping software and devices free of threats.
Application security
This protects the integrity and privacy of data, both in storage and in transit.
Information security
This includes the processes and decisions for handling and protecting data assets.
Operational Security
This define how an organization responds to a cybersecurity incident.
Disaster recovery and business continuity
These policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event.
Disaster recovery policies
This is the plan for when the organization falls back on while trying to operate without certain resources.
Business continuity
This addresses the most unpredictable cyber-security factor: people.
End-user education
What are the main principles of information security?
Confidentiality
Integrity
Availability
This means that data should only be able to be seen by the people in the organization that need to see it in order to do their jobs.
Confidentiality
This is protecting information from being modified by unauthorized parties. It involves maintaining the accuracy, consistency and trustworthiness of data by implementing security measures.
Integrity
This is protecting information from being modified by unauthorized parties.
Availability
This is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewall
This is a person who breaks into a computer system.
Hacker
This is anything that can compromise the confidentiality, integrity, or availability of an information system.
Threat
This is any weakness in the information technology (IT) infrastructure that hackers can exploit to gain unauthorized access to data.
Vulnerability