I - 230 Cybersecurity

Informatics - Cybersecurity

38 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
Computer and network security are based on what 3 pillars?
ConfidentialityIntegrityAvailability
What is a favored authentication method?
Username and password: who you say you are and prove it
What does secrecy ensure?
Users only access info they are allowed to access
What does confidentiality ensure?
The protection of private info as well as sensitive business documents
What does authenticity provide?
A way of verifying the origin of data by who entered or sent it
What does accuracy and integrity mean?
System must not corrupt the info or allow malicious or accidental changes
What is confidentiality associated with?
Business environments
What is secrecy associated with?
Government systems where access is determined by security clearances
What is message authentication?
A method that ensures the accuracy of a transmission
What does availability mean?
Hardware and software keep working efficiently and systems can recover quickly if a disaster occurs
What is the opposite of availability?
Denial of service, unable to get resources needed
What is vulnerability?
Point where a system is susceptible to attack - no password protection
What is a threat?
Possible danger to system - hacker
What are countermeasures?
Techniques for protection your system
What are some types of vulnerabilities?
Physical - theft - lock Natural - dust - coverHard/software - patch flawsMedia - damage - backup filesEmanations - eavesdropping - TEMPEST