Data Security/ Privacy Flashcards

1
Q

Authentication

A

A method for confirming users identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

The process of providing a user with permission including access levels and abilities such as a file access, hours of access, and amount of allocated storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometrics

A

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Content filtering

A

Occur seven organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Downtime

A

Refers to a period of time when a system is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

Scrambles information into an alternative form that requires a key a password to decrypt the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

Hardware and/or software that guard a private network by analyzing incoming and out coming information for the correct markings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacker

A

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or for the challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information security

A

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Insiders

A

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion detection software (IDS)

A

Features full-time monitoring tools that search for patterns in network traffic to identify intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious code

A

Includes a variety of threats such as viruses, worms, and Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of service

A

Floods a website with so many requests for service that it slows down or crashes the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Packet tampering

A

Consists of altering the contents of as they travel over the Internet or altering data on computer disks after penetrating a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

A technique to gain personal information for the purpose of identify theft, usually by means of fraudulent emails that look as though they came from legitimate business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

Using your social skills to trick people into revealing access credentials or other valuable information

17
Q

Dumpster diving

A

Looking through people’s trash, another way hackers obtain information

18
Q

Smart card

A

A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

19
Q

Spyware

A

A special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission

20
Q

Spoofing

A

The forging of the return address on an email so that the email message appears to come from someone other than the actual sender