Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Exam Def-Terms #1

Exam Prep Def-Terms #1

TermDefinition
Confidentiality PRIVATE....This term relates to the act of sharing or revealing information only to authorized personnel. (PRIVATE...DATA IS SECURE ONLY TO PEOPLE WHO NEED TO HAVE IT)
Integrity TRUSTED....This term relates to the ability to ensure that information or data remains unchanged and accurate. (DATA CAN BE TRUSTED. NO CHANGES)
Availability READY....This term relates to ensuring data or service accessibility to those who require it, when they require it.
Asset PROPERTY....This term relates to property that belongs to an individual, organization, company, etc. (THINGS YOU WANT TO PROTECT)
Threat This term relates to the possibility of being a cyber attack target.
Risk This term relates to the POTENTIAL DAMAGE to an individual or organization that exists due to lack of security or awareness.
Vulnerability FLAW....This term relates to a weakness that can create risks.
Exploitation This term relates to taking advantage of vulnerabilities to gain access to and control over a system.(TAKING ADVANTAGE OF RISK)
Firewall This term relates to software that inspects, detects, and blocks traffic based on policies and parameters (IP, port, etc.) (FIRST LINE OF DEFENSE)
Antivirus This term relates to a software that inspects, detects, and removes malicious programs. (STOPS VIRUSES)
Information Security This term refers to defending and protecting the information itself, both digital and physical. (PROTECTING INFOMATION)
Cybersecurity This term refers to a field that is dedicated to defending and protecting cyberspace against all kinds of cyber threats and crimes.(PROTECTING CYBERSPACE)
Malware Software designed for malicious purposes, or malicious software. (MALICIOUS-WARE- Malicious means POISONOUS)
Virus Self-replicating software that targets systems in a computer and attaches itself to them upon execution. (SPECIFIC TASK- 1 TASK)
Worm This term refers to a self-replicating software similar to a virus, BUT DOES NOT REQUIRE USER INTERVENTION for it to be executed. It can spread to other computers, typically over a network.
Trojan Horse Malware that masquerades as a legitimate program but causes a lot of damage when executed. This Malware does not self-replicate like worms or viruses. They can, however, create backdoors in systems (LOOKS LIKE ITS LEGIT BUT IT'S MALWARE)
Spyware Malware that attempts to COLLECT information from a computer. (HIDES IN THE BACKGROUND)
Ransomware Malware that Encrypts (CONCEALS or HIDES) computer files and prevents them from being accessed or restored. (HIDES & HOLDS HOSTAGE)
Encrypt/Encryption CONCEALS or HIDES Data by Converting it into a code. (CONCEALS it then CONVERTS it)
Phishing Social Engineering Attack commonly done through email across a large audience
ARP Poisoning This Attack deceives a device on network, poisoning its table associations of other devices
DNS Poisoning This Attack Manipulates the information in DNS Records & use it to Redirect online traffic to a Malicious FAKE Website.
ZERO Day Vulnerabilities Vulnerabilities NOT YET Detected by Anti-Malware Software
Man in the Middle (MiTM) This Attack allows Attackers to Secretly Intercept Communications or Alter them
Created by: Ncogneto
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards