Explore tens of thousands of sets crafted by our community.
Network Security
18
Flashcards
0/18
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information. It's a significant threat to security.
Integrity
The assurance that information has not been altered in an unauthorized manner. It ensures data accuracy and reliability.
Denial-of-Service Attack (DoS)
An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming the target with a flood of internet traffic.
Authentication
The process of verifying the identity of a user or device. It is important to ensure that access to systems is granted to the right entities.
Confidentiality
The concept of keeping sensitive information private and disclosing it only to authorized parties. It helps protect personal privacy and proprietary information.
Distributed Denial-of-Service Attack (DDoS)
A type of attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Virtual Private Network (VPN)
A technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPNs allow secure access to organizational resources.
Availability
The principle that authorized users should have reliable and timely access to resources and information. It helps maintain productivity and service delivery.
Intrusion Prevention System (IPS)
A system that not only detects suspicious activity but also takes action to prevent the threat. It can block traffic from an IP address or quarantine a virus.
Honeypot
A decoy system intended to mimic likely targets of cyber attacks. It can be used to detect and analyze threats and deflect them from legitimate targets.
Risk Assessment
The process of identifying, analyzing, and evaluating risk. It helps organizations understand the potential impact of different security threats.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It helps in identifying potential security breaches.
Malware
Short for 'malicious software', it refers to any software designed to cause damage to a single computer, server, or computer network. Examples are viruses, worms, and Trojans.
Zero-Day Exploit
A cyber-attack targeting a software vulnerability that is unknown to the software vendor and has no patch available. It is significant because protection is difficult.
Authorization
The process of granting or denying specific privileges to an authenticated user or device. It defines what an authenticated entity is allowed to do.
Encryption
The process of converting plaintext into ciphertext to prevent unauthorized access. It protects data confidentiality during transmission or while at rest.
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
© Hypatia.Tech. 2024 All rights reserved.