Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Unit 1 Info Security

info security and its terms i need to know

TermDefinition
CIA triad Confidentiality, integrity and availability
Security Triad model designed to guide policies for information security
Confidentiality the state of keeping or being kept secret or private
Integrity quality of being honest
Availability quality of being able to be used or obtained
Physical controls safeguards or countermeasures to avoid, detect, counteract, or minimize security risks
Logical controls tools and protocols used for identification, authentication, authorization, and accountability in computer information systems
Administrative controls changes in work procedures
Client-Layer architecture in which presentation, application processing, and data management functions are physically separated
Application Layer consists of protocols that focus on process-to-process communication across an IP network
Data Layer ensure maximum flexibility, portability, and ease of implementation
SDOS Social,Decision, and Organizational Sciences
DDOS Distributed Denial Of Services
SQL Injection code injection technique that might destroy your database
XSS attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites
CSRF attack that forces an end user to execute unwanted actions on a web application -Cross-Site Request Forgery
Authentication process or action of proving or showing
Authorization action or fact of authorizing
Malware software that is intended to damage or disable computers and computer systems
Virus a type of error in your system that can infect other systems
Trojan horse program designed to breach the security of a computer system
Worm self-replicating malware that duplicates itself to spread to uninfected computers
hoax malicious deception
Root kit collection of computer software mostly malicious
Session fixation attack that permits an attacker to hijack a valid user session
AUP document stipulating constraints and practices that a user must agree to for access to a corporate network - acceptable use policy
TOS a field in the Internet Protocol version 4
SPAM types of hacking that try to get your info by making you click on links you don't need
Phishing a scam hackers use to get your personal info by pretending they are you
SpearPhishing email or electronic communications scam targeted towards a specific individual, organization or business
Eavesdropping an over the shoulder attack
Man in the middle attack where the attacker secretly relays and possibly alters the communication between two parties
Bluesnarfing theft of information from a wireless device through a Bluetooth connection
War driving act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a laptop or smartphone
Identity theft fraudulent acquisition and use of a person's private identifying information, usually for financial gain
Social engineering use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society
Firewall part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Cookies a way information is stored into a computer in certain sites
Sniffer a type of packet analyzer
Vpn vitual private network - extends a private network across a public network
SSID primary name associated with an 802.11 wireless local area network
MAC ID fast way to unlock your Mac using just your fingerprint
PKI public key infostructure - set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
Certificates digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet
Thumbprint a type of new bio metric scanning
Biometrics technical term for body measurements and calculations
Libel false and damaging statements made about another person
Copyright legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution
Plagiarism practice of taking someone else's work or ideas and passing them off as one's own
Created by: FilthyCasual
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards