• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

What is Information Security?

The protection of info from unauthorized access, modification and disruption of data unless Approved by an organization.

3 Core Principles of Security that form the CIA Triangle

Confidentiality, Integrity and Availability

What is confidentiality

Prevention of disclosure of info to Unauthorized Personnel

What is integrity

Keeping data from being Tampered

What is Availability?

Data is Accessible When Needed

The other principle in Security besides the CIA triangle is _ _ _.

AAA - Authentication, Authorization and Accounting

What is Authentication?

Establishing a person's identity

What is Authorization?

Giving a user access.

What is Accounting?

Tracking data, computer and network usage

What is Non-Repudiaton?

Indisputable proof that somebody did something they they cannot deny.

What are the 3 categories of security controls in planning a Security Plan?

Phsyical, Technical, and Administrative

What is the definition of the physical security control?

Items such as Alarm Systems, locks, ID's, guards

What is the definition of a technical security control?

Smart cards, ACL's, Encryption, Network Authentication

What is the Administrative Security Control?

Policies/procedures, training, planning, disaster recover

What is Defense in Depth?

Layering strategy that utilizes multiple security techniques

T/F: A well planned security system is 100 per cent secure.

False: a security system is never 100 per cent secure.

What are 5 common labels of hackers?

White hats, Black hats, Gray hats, Blue hats and the Elite

What is a White Hat?

Good guys; hack to test the network

What is a Black Hat?

Bad guys

What is the Gray Hat?

People not associated with the IT company; break in and notify the company it happened. Ask for money.

What is a Blue Hat?

A third company Asked by the IT company to break into their network to test their network.

What is the Elite

Top hackers