Network Security Vocabulary

Description

Terms used in Network Securtiy.
Shantal K  Green
Flashcards by Shantal K Green, updated more than 1 year ago
Shantal K  Green
Created by Shantal K Green about 4 years ago
8
0

Resource summary

Question Answer
Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access
Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct
Availability means that authorized users have access to the systems and the resources they need
CIA Confidentiality, Integrity, Availability
Principle of Least Privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work
Social Engineering the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
Attack Surface a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment
Attack Surface analysis an assessment of the total number of exploitable vulnerabilities in a system or network or other potential computer attack target. IT security workers and hackers both use it to detect security weaknesses in a system
Threat Modeling a computer security optimization process that allows for a structured approach while properly identifying and addressing system threats. The process involves systematically identifying security threats and rating them according to severity and level of occurrence probability
Physical Security the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism
Computer Security -allows you to use the computer while keeping it safe from threats -can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware
Removable Devices -any type of storage device that can be removed from a computer while the system is running -examples include CDs, DVDs and Blu-Ray disks, as well as diskettes and USB drives
Removable Drives USB drive CD, DVD, hard disk or floppy disk
Access Control a security technique that regulates who or what can view or use resources in a computing environment
Physical Access Control limits access to campuses, buildings, rooms and physical IT assets
Logical Access Control limits connections to computer networks, system files and data
Mobile Device Security the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. It is also known as wireless security.
Keyloggers a type of surveillance software that once installed on a system, has the capability to record every keystroke made on that system. The recording is saved in a log file, usually encrypted
Internet Security a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the process, it prevents attacks targeted at browsers, network, operating systems, and other applications
SSID service set identifier -the technical term for a network name. - on a wireless home network, you give it a name to distinguish it from other networks. You'll see this name when you connect your computer to your wireless network. WPA2 is a standard for wireless security
MAC Filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network
Security Network Key a kind of network password or the passphrase in the form of physical, digital signature or biometric data password that is used to provide authorization and accessibility to the wireless network or device on which the client requests to connect with
Show full summary Hide full summary

Similar

Project Communications Management
farzanajeffri
Common Technology Terms
Julio Aldine Branch-HCPL
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane