Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
A virtual private network (VPN)
|
provides a secure “tunnel” through the Internet for transmitting messages and data via a private network.
|
|
Access controls
|
are designed to protect systems from unauthorized access to preserve data integrity.
|
|
Asymmetric encryption
|
uses two keys: a public key known to everyone and a private or secret key known only to the recipient.
|
|
Availability
|
ensures that computers and networks are operating, and authorized users can access the information they need.
|
|
Backdoor
|
also called a “trapdoor”) is a programming routine built into a system by its designer or programmer. This routine enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
|
|
Biometric security measures
|
use a physiological element to enhance security measures. These elements are unique to a person and can’t be stolen, lost, copied, or passed on to others.
|
|
blended threat
|
A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
|
|
Business continuity planning
|
outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.
|
|
callback modem
|
A callback modem is used to verify whether a user’s access is valid by logging the user off and then calling the user back at a predetermined number.
|
|
Confidentiality
|
means a system must not allow the disclosure of information to anyone who isn't authorized to access it.
|
|
Data encryption
|
transforms data, called “plaintext” or “cleartext,” into a scrambled form called “ciphertext” that can’t be read by others.
|
|
denial–of–service (DoS) attack
|
A denial–of–service (DoS) attack floods a network or server with service requests to prevent legitimate users’ access to the system.
|
|
Fault–tolerant systems
|
ensure availability in case of a system failure by using a combination of hardware and software.
|
|
firewall
|
combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
|
|
Integrity
|
ensures the accuracy of information resources in an organization.
|
|
intrusion detection system (IDS)
|
can protect against both external and internal access. They’re usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.
|
|
logic bomb
|
type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time or by an event, such as a user pressing Enter or running a specific program.
|
|
Physical security measures
|
primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
|
|
Secure Sockets Layers (SSL)
|
is a commonly used encryption protocol that manages transmission security on the Internet.
|
|
social engineering
|
In the context of security, it means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.
|
|
symmetric encryption
|
(also called “secret key encryption”), the same key is used to encrypt and decrypt the message.
|
|
Transport Layer Security (TLS)
|
is a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet
|
|
Trojan program
|
contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
|
|
virus
|
consists of self–propagating program code that’s triggered by a specified time or event.
|
|
worm
|
travels from computer to computer in a network. They are independent programs that can spread themselves without having to be attached to a host program.
|