Upgrade to remove ads
IT Fundamentals - Security Practices
Get Quizlet's official IT Fundamentals - 1 term, 1 practice question, 1 full practice test
CC-BY-SA source: https://en.wikiversity.org/wiki/IT_Fundamentals/Security_Practices
Terms in this set (24)
The process of securing a system by reducing its surface of vulnerability.
A computer program used to prevent, detect, and remove malware.
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Filters traffic between two or more networks and run on network hardware.
Runs on individual computers and controls network traffic in and out of those machines.
security best practices
Antivirus/anti-malware, host firewall, changing default passwords, enabling passwords, safe browsing practices, patching/updates
device use best practices
Software sources, removal of unwanted software
A memorized secret, typically a string of characters, used to confirm the identity of a user.
password best practices
Length, complexity, history, expiration, reuse, password managers, reset process.
The process of encoding information.
Original representation of information.
encryption best practices
At rest, in transit, and during processing.
A form of disk encryption where files or directories are encrypted by the file system.
A form of disk encryption where the entire partition or disk in which the file system resides is encrypted.
Protocol used to encrypt email.
Protocol used to encrypt web browser communication.
Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Gathering of statistics, spreading of spyware, and exploitation of various forms of software faults.
A statement or a legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data.
Anything that can be used to identify an individual.
Any information relating to an identifiable person.
A numeric or alpha-numeric password used in the process of authenticating a user accessing a system.
THIS SET IS OFTEN IN FOLDERS WITH...
IT Fundamentals - Components
IT Fundamentals - Peripherals
IT Fundamentals - Operating Systems
IT Fundamentals - Applications
YOU MIGHT ALSO LIKE...
Midterm Info Tech study guide
Chapter 3 and 4 intro to computers
Client Installation Chp. 7 & 8
OTHER SETS BY THIS CREATOR
IT Fundamentals - Business Continuity
IT Fundamentals - Troubleshooting
IT Fundamentals - Security Concepts
IT Fundamentals - Internet
OTHER QUIZLET SETS
world geo final
Chapters 12, 23, & 57
PH 504 Group Activity