Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
Access Control |
The process of restricting access to a resource to only permitted users, applications, or computer systems. |
|
Attack Surface |
The exposure, the reachable and exploitable vulnerabilities that a system or technology has. |
|
Availability |
Describes a resource being accessible to a user, application, or computer system when required. In other words, availability means that when a user needs to get to information, he or she has the ability to do so. |
|
Confidentiality |
The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. |
|
Defense in Depth |
Using multiple layers of security to defend your assets. |
|
Flash Drive |
A small drive based on flash memory. |
|
Integrity |
The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. |
|
Keylogger |
A physical or logical device used to capture keystrokes. |
|
Mobile Device |
Small devices that are used to process information, send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with internal networks and systems. They include laptops, PDAs (personal digital assistants), and smartphones. |
|
Principle of Least Privilege |
A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job. |
|
Removable Device |
A storage device that is designed to be taken out of a computer without turning the computer off. |
|
Residual Risk |
The risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event. |
|
Risk |
The probability that an event will occur. In reality, businesses are concerned only about risks that would negatively impact the computing environment. |
|
Risk Acceptance |
The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk. |
|
Risk Assessment |
Identifies the risks that might impact your particular environment. |
|
Risk Avoidance |
The process of eliminating a risk by choosing not to engage in an action or activity. |
|
Risk Management |
The process of identifying, assessing, and prioritizing threats and risks. |
|
Risk Mitigation |
Taking steps to reduce the likelihood or impact of a risk.
|
|
Risk Transfer |
The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing. |
|
Social Engineering |
A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked. |
|
Threat |
An action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities. |