tools to protect business operations Flashcards
(11 cards)
Programming
process that can be used to create a specific set of instructions for a computer to execute tasks.
Automation
use of technology to reduce human and manual effort in performing common and repetitive tasks.
Structured Query Language (SQL)
used to create, interact with, and request information from a database.
database
organized collection of information or data
operating system
the interface between computer hardware and the user.
Web vulnerability
a unique flaw in a web application that a threat actor could exploit by using malicious code or behavior, to allow unauthorized access, data theft, and malware deployment.
Antivirus software
software program used to prevent, detect, and eliminate malware and viruses.
intrusion detection system (IDS)
an application that monitors system activity and alerts on possible intrusions. The system scans and analyzes network packets
Encryption
the process of converting data from a readable format to a cryptographically encoded format. Encryption makes data unreadable and difficult to decode for an unauthorized user; its main goal is to ensure confidentiality of private data.
Cryptographic encoding
converting plaintext into secure ciphertext.
Penetration testing
also called pen testing, is the act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes