Information Security
Help!
|
|
||||
---|---|---|---|---|---|
show | PRIVACY The right to be left alone and to be free of unreasonable personal intrusion.INFORMATION PRIVACY the right to determine when, and to what extent, personal information can be gathered by and/or communicated to others
🗑
|
||||
show | 1. The right of privacy is not absolute. Privacy must be balanced against the needs of society.
2. The public's right to know supersedes the individual's right of privacy.
🗑
|
||||
show | The process of forming a digital dossier (An electronic description of an individual and his or her habits)
🗑
|
||||
show | Tracking people's activities with the aid of computers
🗑
|
||||
URL filtering | show 🗑
|
||||
Opt-out informed consent | show 🗑
|
||||
Opt-in informed consent | show 🗑
|
||||
show | Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
🗑
|
||||
Browser history | show 🗑
|
||||
Personal firewall | show 🗑
|
||||
Anti-malware | show 🗑
|
||||
show | type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
🗑
|
||||
Content-filtering software | show 🗑
|
||||
show | device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.
🗑
|
||||
Two-factor authentication | show 🗑
|
||||
show | any network within your organization
🗑
|
||||
Untrusted network | show 🗑
|
||||
show | A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
🗑
|
||||
Zombies (bots) | show 🗑
|
||||
show | Malicious software such as viruses and worms
🗑
|
||||
show | A software program containing a hidden function that presents a security risk
🗑
|
||||
show | Malicious software that can attach itself to (or “infect”) other computer programs without the owner of the program being aware of the infection.
🗑
|
||||
Worm | show 🗑
|
||||
show | An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail
🗑
|
||||
show | Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges
🗑
|
||||
show | Controls that restrict unauthorized individuals from gaining access to a company's computer facilities
🗑
|
||||
Access controls | show 🗑
|
||||
show | A process that determines the identity of the person requiring access.
🗑
|
||||
Password | show 🗑
|
||||
show | a sequence of words or other text used to control access to a computer system, program or data
🗑
|
||||
show | A process that determines which actions, rights, or privileges the person has, based on verified identity.
🗑
|
||||
show | The science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.
🗑
|
||||
Firewall | show 🗑
|
||||
show | A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
🗑
|
||||
show | A process in which a company identifies certain types of software that are not allowed to run in the company environment.
🗑
|
||||
show | The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
🗑
|
||||
Public-key encryption | show 🗑
|
||||
show | An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
willjhg