• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
A virtual private network (VPN)
provides a secure “tunnel” through the Internet for transmitting messages and data via a private network.
Access controls
are designed to protect systems from unauthorized access to preserve data integrity.
Asymmetric encryption
uses two keys: a public key known to everyone and a private or secret key known only to the recipient.
Availability
ensures that computers and networks are operating, and authorized users can access the information they need.
Backdoor
also called a “trapdoor”) is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Biometric security measures
use a physiological element to enhance security measures. These elements are unique to a person and can’t be stolen, lost, copied, or passed on to others.
blended threat
A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
Business continuity planning
outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
callback modem
A callback modem is used to verify whether a user’s access is valid by logging the user off and then calling the user back at a predetermined number.
Confidentiality
means a system must not allow the disclosure of information to anyone who isn't authorized to access it.
Data encryption
transforms data, called “plaintext” or “cleartext,” into a scrambled form called “ciphertext” that can’t be read by others.
denial–of–service (DoS) attack
A denial–of–service (DoS) attack floods a network or server with service requests to prevent legitimate users’ access to the system.
Fault–tolerant systems
ensure availability in case of a system failure by using a combination of hardware and software.
firewall
combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
Integrity
ensures the accuracy of information resources in an organization.
intrusion detection system (IDS)
can protect against both external and internal access. They’re usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.
logic bomb
type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by an event, such as a user pressing Enter or running a specific program.
Physical security measures
primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
Secure Sockets Layers (SSL)
is a commonly used encryption protocol that manages transmission security on the Internet.
social engineering
In the context of security, it means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.
symmetric encryption
(also called “secret key encryption”), the same key is used to encrypt and decrypt the message.
Transport Layer Security (TLS)
is a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet
Trojan program
contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
virus
consists of self–propagating program code that’s triggered by a specified time or event.
worm
travels from computer to computer in a network. They are independent programs that can spread themselves without having to be attached to a host program.