• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
Company's use what process to protect their system networks.
Plan, protect and respond cycle.
What are the 4 security planning principles?
1. Risk analysis
2. Comprehensive security
3. Defense in depth
4. Minimum permissions
Protecting consists of what?
1. Access controls
2. Firewalls
3. Cryptography
Risk Analysis
The process of balancing threats and protection costs.
Comprehensive security
All avenues for an attack are closed off.
Defense in depth
Multiple lines of defense that must all be breached for an attacker to succeed.
Minimum permissions in access control
Limiting who may have access to each resource by limiting permissions.
Hacking
Intentional use of a computer resource without authorization or in excess of authorization.
Denial of Service (DoS)
Attacks that overload victims servers so that they cannot serve users.
What 2 common goals of an attacker?
Credit card number theft
Identity theft
What kind of an issue is security?
A management issue
Cryptography
The use of mathematics to protect message dialogues.
Cryptology
The science of making and breaking codes
Cryptoanalysis
Breaking secret codes