Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
ISBB Chapter 6 - Information Systems Security
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (16)
Access Control
To ensure that that the user can only access the information resources that are appropriate. It determines which users can authorized to read, modify, add, and/or delete information.
Authentication
Making sure a person is who they say they are. Three factor identification: Identifying someone: something they know, something they have, or something they are.
Availability
That information can be accessed and modified by anyone authorized to do so in appropriate time frame.
Backup
The procedure for making extra copies of data in case the original is lost or damaged.
Biometric Authentication
A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. Example, a fingerprint scan.
Confidentiality
Protecting information, to be able to restrict access to only those who are allowed to see it.
Encryption
The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
FERPA
Family Educational Rights and Privacy Act. This act restricts who has access to student information.
Firewall
A software program or hardware device that is used to increase security on its network by blocking unwanted messages/data.
HIPPA
Health Insurance Portability and Accountability Act. Health care organizations are obligated to follow several regulations regarding people's medical data, particularly patient privacy.
Integrity
The assurance that the information being accessed has not been altered and truly represents what is intended.
Intrustion Detection System
Works to provide the functionality to identify if the network is being attacked.
Multifactor Authentication
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
Physical Security
The protection of the actual hardware and networking components that store and transmit information resources.
Universal Power Supply
A device that provides battery backup to critical components of the system, allowing they system to stay online longer and/or allowing the IT Staff to shut them down using proper procedures in order to prevent the data loss that might occur from power failure.
VPN
A virtual private network allows user who are outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Sets with similar terms
Cybersecurity Essentials Chapter 2
39 terms
Cybersecurity Essentials Chapter 2
39 terms
Chapter 5 ITECH
64 terms
infoseckey6
48 terms
Sets found in the same folder
ISBB Chapter 4 - Data and Databases
19 terms
ISBB Chapter 5 - Networking and Communication
30 terms
ISBB Chapter 3 - Software
18 terms
ISBB Chapter 2 - Hardware
22 terms
Other sets by this creator
ISBB Chapter 13 - Future Trends in Information Sys…
5 terms
ISBB Chapter 12 - The Ethical and Legal Implicatio…
16 terms
ISBB Chapter 11 - Globalization and the Digital Di…
2 terms
ISBB Chapter 10 - Information Systems Development
16 terms
Verified questions
SOCIOLOGY
Identify three specific types of reform in public education.
SOCIOLOGY
Match the situation below with the key term (a-e) it illustrates. A school principal hands out diplomas at a graduation ceremony. a. role b. role conflict c. role performance d. role strain e. social interaction.
SOCIOLOGY
Would you consider the looters in New Orleans following Hurricane Katrina to be a representative sample of the disaster victims? If so, why? If not, why were some news reports presenting them as such?
SOCIOLOGY
What is a major distinction between members of the upper-middle and the middle-middle classes?
Other Quizlet sets
ss final vocab
44 terms
Financial: M4 - Fair Value Measurements
13 terms
Biology Exam 2
34 terms
PPC 2 and readings
16 terms
Related questions
QUESTION
Which attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm?
QUESTION
What is it called when someone attempts to befriend you online for the purpose of stealing a confidential or sensitive information?
QUESTION
T or F Spyware is electronic junk mail or junk newsgroup postings, posted usually for the purpose of advertising some product and/or service.
QUESTION
Lukes's second dimension of power is more complicated and occurs when the power is so formidable that...