Chapter 1 Flashcards
(16 cards)
Asset
property the belongs to an individual
threat
possibility of being attacked
risk
potential damage to an individual that exists due to lack of security
vulnerability
weakness in network that can pose risks
exploit
taking advantage of vulnerabilities
firewall
software that inspects, detects, and blocks traffic based on permissions and parameters
antivirus
software that inspects, detects, and removes malicious programs
CIA triad
Confidentiality, integrity, and availability. sharing or revealing info only to those authorized, ability to ensure that data or info is unchanged, ensure data is available to those who require it
malware
software designed for a malicious purpose
virus
self-replicating software that corrupts or destroys system, executioner files (exe)
worm
malicious software the consumes resources, spreads through network, slower, does not require user intervention to be executed
trojan horse
disguises itself as a legit program that hides malware
spyware
harvests information
ransomware
encrypts computer files, denies access, usually for financial purposes
white hats
ethical hackers
black hats
malicious hackers, illegal, personal gain