Assets, Threats, and Vulnerabilities: Module 2 Flashcards

(40 cards)

1
Q

Access Controls

A

Tools that manage who can see or do things with information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm

A

A set of steps to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Programming Interface (API) Token

A

A small code that proves who a user is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption

A

Using one key to lock and a different key to unlock data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Basic Auth

A

A way to check who a user is before giving access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bit

A

The tiniest piece of data on a computer (0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute Force Attack

A

Guessing passwords over and over until one works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cipher

A

A tool that hides information by turning it into secret code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptographic Key

A

A special code that unlocks secret messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptography

A

Turning information into code so others can’t read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Custodian

A

The person who keeps data safe and handles it properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Owner

A

The person who decides who can use or change the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Certificate

A

A file that proves someone’s online identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

Turning readable information into secret code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash Collision

A

When two different things turn into the same hash code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash Function

A

A formula that turns data into a unique code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hash Table

A

A storage space for codes made by a hash function

18
Q

Identity and Access Management (IAM)

A

Tools and rules that control who can access what in a system

19
Q

Information Privacy

A

Protecting data from being seen or shared without permission

20
Q

Multi-Factor Authentication (MFA)

A

Using two or more ways to prove who you are

21
Q

Non-Repudiation

A

Making sure someone can’t deny they sent or got something

22
Q

OAuth

A

A way for apps to safely share access without giving passwords

23
Q

Payment Card Industry Data Security Standards (PCI DSS)

A

Rules to protect credit card and payment info

24
Q

Personally Identifiable Information (PII)

A

Any detail that can be used to figure out who someone is

25
Principle of Least Privilege
Only giving someone the access they need to do their job
26
Protected Health Information (PHI)
Private medical details about a person’s health
27
Public Key Infrastructure (PKI)
A system that keeps online info secure with special keys
28
Rainbow Table
A cheat sheet of passwords and their matching codes
29
Salting
Adding random letters to passwords before coding them to make them safer
30
Security Assessment
A check to see how strong a company’s security is
31
Security Audit
A review of how well a company follows security rules
32
Security Controls
Tools that help keep systems safe
33
Separation of Duties
Making sure no one person has too much power in a system
34
Session
A time when a user interacts with a website or app
35
Session Cookie
A file that keeps track of a user while they’re logged in
36
Session Hijacking
When a hacker takes over someone else’s login session
37
Session ID
A special code that tells a system who the user is
38
Single Sign-On (SSO)
Using one login to access many apps or sites
39
Symmetric Encryption
Using the same key to lock and unlock data
40
User Provisioning
Creating and managing a user’s account and access