Fundamentals of Security Flashcards
(15 cards)
What is Encryption?
Encryption- Process of converting data into code to prevent unauthorized access
What do Access controls do?
Ensure only authorized personnel can access certain types of data
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and use for authorized users
What is Integrity?
verifies the accuracy and trustworthiness of data over the entire lifecycle
What is a Hash
Process of converting data into a fixed-size value
Why are Digitak Signatures Important?
Use encryption to ensure integrity and authenticity
What are Checksums?
Method to verify the integrity of data during transmission
Availability
Used to ensure that information systems, and resource are accessible and operational when needed by authorized users.
What is Redundancy?
Redundancy- Duplication of critical components or functions of a system with the intentions of enhancing it’s reliability.
Server redundancy
Using multiple servers in a load balance so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users
Data Redundancy
Involves storing data in multiple places, In the case if one storage site fails the data can be used from another location
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
Power Redundancy
Involves using back up power sources
Like Generators
What is Non-Repudiation?
Focused on providing undeniable proof in digital transactions
A security measure that ensures individuals involved in communication or transaction cannot deny their participation.