Study sets, textbooks, questions
Upgrade to remove ads
ISBB Chapter 6 - Information Systems Security
Terms in this set (16)
To ensure that that the user can only access the information resources that are appropriate. It determines which users can authorized to read, modify, add, and/or delete information.
Making sure a person is who they say they are. Three factor identification: Identifying someone: something they know, something they have, or something they are.
That information can be accessed and modified by anyone authorized to do so in appropriate time frame.
The procedure for making extra copies of data in case the original is lost or damaged.
A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. Example, a fingerprint scan.
Protecting information, to be able to restrict access to only those who are allowed to see it.
The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
Family Educational Rights and Privacy Act. This act restricts who has access to student information.
A software program or hardware device that is used to increase security on its network by blocking unwanted messages/data.
Health Insurance Portability and Accountability Act. Health care organizations are obligated to follow several regulations regarding people's medical data, particularly patient privacy.
The assurance that the information being accessed has not been altered and truly represents what is intended.
Intrustion Detection System
Works to provide the functionality to identify if the network is being attacked.
A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
The protection of the actual hardware and networking components that store and transmit information resources.
Universal Power Supply
A device that provides battery backup to critical components of the system, allowing they system to stay online longer and/or allowing the IT Staff to shut them down using proper procedures in order to prevent the data loss that might occur from power failure.
A virtual private network allows user who are outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Sets with similar terms
Cybersecurity Essentials Chapter 2
Cybersecurity Essentials Chapter 2
Chapter 5 ITECH
Sets found in the same folder
ISBB Chapter 4 - Data and Databases
ISBB Chapter 5 - Networking and Communication
ISBB Chapter 3 - Software
ISBB Chapter 2 - Hardware
Other sets by this creator
ISBB Chapter 13 - Future Trends in Information Sys…
ISBB Chapter 12 - The Ethical and Legal Implicatio…
ISBB Chapter 11 - Globalization and the Digital Di…
ISBB Chapter 10 - Information Systems Development
Identify three specific types of reform in public education.
Match the situation below with the key term (a-e) it illustrates. A school principal hands out diplomas at a graduation ceremony. a. role b. role conflict c. role performance d. role strain e. social interaction.
Would you consider the looters in New Orleans following Hurricane Katrina to be a representative sample of the disaster victims? If so, why? If not, why were some news reports presenting them as such?
What is a major distinction between members of the upper-middle and the middle-middle classes?
Other Quizlet sets
ss final vocab
Financial: M4 - Fair Value Measurements
Biology Exam 2
PPC 2 and readings
Which attack requires the attacker to obtain several encrypted messages that have been encrypted using the same encryption algorithm?
What is it called when someone attempts to befriend you online for the purpose of stealing a confidential or sensitive information?
T or F Spyware is electronic junk mail or junk newsgroup postings, posted usually for the purpose of advertising some product and/or service.
Lukes's second dimension of power is more complicated and occurs when the power is so formidable that...