Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
Company's use what process to protect their system networks.
|
Plan, protect and respond cycle.
|
|
What are the 4 security planning principles?
|
1. Risk analysis
2. Comprehensive security 3. Defense in depth 4. Minimum permissions |
|
Protecting consists of what?
|
1. Access controls
2. Firewalls 3. Cryptography |
|
Risk Analysis
|
The process of balancing threats and protection costs.
|
|
Comprehensive security
|
All avenues for an attack are closed off.
|
|
Defense in depth
|
Multiple lines of defense that must all be breached for an attacker to succeed.
|
|
Minimum permissions in access control
|
Limiting who may have access to each resource by limiting permissions.
|
|
Hacking
|
Intentional use of a computer resource without authorization or in excess of authorization.
|
|
Denial of Service (DoS)
|
Attacks that overload victims servers so that they cannot serve users.
|
|
What 2 common goals of an attacker?
|
Credit card number theft
Identity theft |
|
What kind of an issue is security?
|
A management issue
|
|
Cryptography
|
The use of mathematics to protect message dialogues.
|
|
Cryptology
|
The science of making and breaking codes
|
|
Cryptoanalysis
|
Breaking secret codes
|