• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back

Access Control

The process of restricting access to a resource to only permitted users, applications, or computer systems.

Attack Surface

The exposure, the reachable and exploitable vulnerabilities that a system or technology has.

Availability

Describes a resource being accessible to a user, application, or computer system when required. In other words, availability means that when a user needs to get to information, he or she has the ability to do so.

Confidentiality

The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems.

Defense in Depth

Using multiple layers of security to defend your assets.

Flash Drive

A small drive based on flash memory.

Integrity

The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes.

Keylogger

A physical or logical device used to capture keystrokes.

Mobile Device

Small devices that are used to process information, send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with internal networks and systems. They include laptops, PDAs (personal digital assistants), and smartphones.

Principle of Least Privilege

A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.

Removable Device

A storage device that is designed to be taken out of a computer without turning the computer off.

Residual Risk

The risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event.

Risk

The probability that an event will occur. In reality, businesses are concerned only about risks that would negatively impact the computing environment.

Risk Acceptance

The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk.

Risk Assessment

Identifies the risks that might impact your particular environment.

Risk Avoidance

The process of eliminating a risk by choosing not to engage in an action or activity.

Risk Management

The process of identifying, assessing, and prioritizing threats and risks.

Risk Mitigation

Taking steps to reduce the likelihood or impact of a risk.

Risk Transfer

The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing.

Social Engineering

A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.

Threat

An action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities.