Assets, Threats, and Vulnerabilities: Module 2 Flashcards
(40 cards)
Access Controls
Tools that manage who can see or do things with information
Algorithm
A set of steps to solve a problem
Application Programming Interface (API) Token
A small code that proves who a user is
Asymmetric Encryption
Using one key to lock and a different key to unlock data
Basic Auth
A way to check who a user is before giving access
Bit
The tiniest piece of data on a computer (0 or 1)
Brute Force Attack
Guessing passwords over and over until one works
Cipher
A tool that hides information by turning it into secret code
Cryptographic Key
A special code that unlocks secret messages
Cryptography
Turning information into code so others can’t read it
Data Custodian
The person who keeps data safe and handles it properly
Data Owner
The person who decides who can use or change the data
Digital Certificate
A file that proves someone’s online identity
Encryption
Turning readable information into secret code
Hash Collision
When two different things turn into the same hash code
Hash Function
A formula that turns data into a unique code
Hash Table
A storage space for codes made by a hash function
Identity and Access Management (IAM)
Tools and rules that control who can access what in a system
Information Privacy
Protecting data from being seen or shared without permission
Multi-Factor Authentication (MFA)
Using two or more ways to prove who you are
Non-Repudiation
Making sure someone can’t deny they sent or got something
OAuth
A way for apps to safely share access without giving passwords
Payment Card Industry Data Security Standards (PCI DSS)
Rules to protect credit card and payment info
Personally Identifiable Information (PII)
Any detail that can be used to figure out who someone is