Vocab Flashcards
Checksums
When transferring information, hashing it before sending it and then hashing it when it gets there and comparing the two
Version Control
Storage of other versions of documents so that original versions can be restored.
Confidentiality
restricting access to information and resources to those who are authorized to use it.
Integrity
protecting data from unauthorized modification or deletion.
Availability
ensuring that authorized users are able to access info and resources when they need
Authentication
something you know, something you have, something you are, password
Authorization
specifying access rights to users
Social engineering –
deceiving users with authorized access to disclose information
Trojan Horses
disguised as a legitimate program, does not self replicate or infect
Viruses
attaches to legitimate files or applications, spreads as people share these files or applications
Woms
self replicates, does not require people to share infected files