CHAPTER 4 Flashcards
(60 cards)
Mema lang: TITLE OF CHAPTER 4
INFORMATION,
CONTROL &
PRIVACY
It is a knowledge that you get about
someone or something.
Information
considered relevant truths which have
been validated and identified.
Facts
Information is Considered:
● Expandable
● Compressible
● Transportable
● Diffusive
refers to data, facts, or knowledge that
holds significant worth, relevance, or
usefulness.
Valuable Information
ENUMERATE:
The few characteristics
of valuable information:
● Accurate
● Complete
● Economical
● Reliable
● Flexible
● Relevant
● Simple
● Timely
● Verifiable
● Accessible
● Secure
It is the protection of computer systems
and information from harm, theft, and
unauthorized use.
Computer Security
It is the process of
preventing and detecting unauthorized
use of your computer system.
Computer Security
Computer Security protects computer systems and information from what? (3)
harm (1), theft (2), unauthorized use (3)
ENUMERATE:
Types of Computer Security:
- Information Security
- Application Security
- Network Security
- Cybersecurity
What Type of Computer Security:
securing information
from unauthorized access, modification &
deletion
Information Security
What Type of Computer Security:
securing an application
by building security features to prevent from
Cyber Threats such as SQL injection, DoS
attacks, data breaches and etc.
Application Security
What Type of Computer Security:
securing both the
software and hardware technologies
Network Security
What Type of Computer Security:
defined as protecting
computer systems, which communicate over
the computer networks
Cybersecurity
It is a model designed to guide policies for
information security within an
organization.
CIA TRIAD
The “CIA” in CIA TRIAD stands for:
Confidentiality, Integrity, Availability
The CIA TRIAD:
ensuring that information is available
only to the intended audience.
Confidentiality
The CIA TRIAD:
protecting information from being
modified by unauthorized parties.
Integrity
The CIA TRIAD:
ensures that information and
systems are accessible and
operational when needed.
Availability
are potential risks that have the capability
of disrupting the normal functioning of
computer systems.
They are on
the rise each day, especially with the
digitization of the world.
Computer Security Threats
ENUMERATE:
Types of Computer Security Threats:
- Viruses
- Computer Worm
- Phishing
- Botnet
- Rootkit
- Keylogger
a malicious program
which is loaded into the
user’s computer without
user’s knowledge.
Viruses
a software program that
can copy itself from one
computer to another,
without human interaction.
Computer Worm
Disguising as a trustworthy
person or business,
phishers attempt to steal
sensitive financial or
personal information
through fraudulent email
or instant messages.
Phishing