Upgrade to remove ads
security chapter 1
Terms in this set (21)
Once a person's identity has been proven and authenticated, site security must determine what areas that person has access to.
consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage.
a resource being accessible to a user, application, or computer system when required.
the characteristic of a resource ensuring access is restricted to only permitted users.
Defense in depth
means using multiple layers of security to defend your assets.
a small drive based on flash memory.
the consistency, accuracy, and validity of data or information.
is a physical or logical device used to capture keystrokes.
devices such as laptops, PDAs (personal digital assistants), and smartphones are used to process information, send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with internal networks and systems.
principle of least privilege
a security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.
or drive is a storage device that is designed to be taken out of a computer without turning the computer off.
the risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event.
the probability that a bad event will occur.
is the act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk.
to identify the risks that might impact your particular environment.
is the process of eliminating a risk by choosing not to engage in an action or activity.
is the process of identifying, assessing, and prioritizing threats and risks.
consists of taking steps to reduce the likelihood or impact of a risk.
the act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing.
a method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.
which is defined as an action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities.
YOU MIGHT ALSO LIKE...
Chapter 1 - Security
Networking terms Lesson 1
SF Chapter 1 - Understanding Security Layers
Cyber security vocab
OTHER SETS BY THIS CREATOR
NOTES CHAPTER 4
OTHER QUIZLET SETS
August 9th Interaction of radiation with matter
Lecture 15: Translational control of gene regulati…
Chapter 7 Evaluation of Gait
CHEM 122 Ch. 17