Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
CIA |
Confidentiality Availability Integrity |
|
Confidentiality |
Sharing of important data can cause certain data to be loss |
|
Integrity |
Data is not tampered with |
|
Availability |
Securing computer and networks can be a strain on resources |
|
AAA |
Authentication Authorization Accounting |
|
Non-repudiation |
Assurance that someone can not deny something |
|
Types of hackers |
White hats Black hats Gray hats Blue hats Elite |
|
White hats |
Non malicious |
|
Black hats |
Malicious individuals who attempt to break into a computer and computer networks without authorization |
|
Gray hats |
Do things the believe are right |
|
In info-sec, what are the three main goals? |
Confidentiality Integrity Availability |
|
To protect against malicious attacks, what should you think like? |
Hacker |
|
Tom sends out emails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the emails? |
Non-repudiation |
|
Which of the following is the greatest risk when it comes to removable storage? |
Confidentiality of data |