• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

CIA

Confidentiality


Availability


Integrity

Confidentiality

Sharing of important data can cause certain data to be loss

Integrity

Data is not tampered with

Availability

Securing computer and networks can be a strain on resources

AAA

Authentication


Authorization


Accounting

Non-repudiation

Assurance that someone can not deny something

Types of hackers

White hats


Black hats


Gray hats


Blue hats


Elite

White hats

Non malicious

Black hats

Malicious individuals who attempt to break into a computer and computer networks without authorization

Gray hats

Do things the believe are right

In info-sec, what are the three main goals?

Confidentiality


Integrity


Availability

To protect against malicious attacks, what should you think like?

Hacker

Tom sends out emails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the emails?

Non-repudiation

Which of the following is the greatest risk when it comes to removable storage?

Confidentiality of data