Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Network Security

18

Flashcards

0/18

Still learning
StarStarStarStar

Social Engineering

StarStarStarStar

The psychological manipulation of people into performing actions or divulging confidential information. It's a significant threat to security.

StarStarStarStar

Integrity

StarStarStarStar

The assurance that information has not been altered in an unauthorized manner. It ensures data accuracy and reliability.

StarStarStarStar

Denial-of-Service Attack (DoS)

StarStarStarStar

An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming the target with a flood of internet traffic.

StarStarStarStar

Authentication

StarStarStarStar

The process of verifying the identity of a user or device. It is important to ensure that access to systems is granted to the right entities.

StarStarStarStar

Confidentiality

StarStarStarStar

The concept of keeping sensitive information private and disclosing it only to authorized parties. It helps protect personal privacy and proprietary information.

StarStarStarStar

Distributed Denial-of-Service Attack (DDoS)

StarStarStarStar

A type of attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

StarStarStarStar

Firewall

StarStarStarStar

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

StarStarStarStar

Virtual Private Network (VPN)

StarStarStarStar

A technology that creates a safe and encrypted connection over a less secure network, such as the internet. VPNs allow secure access to organizational resources.

StarStarStarStar

Availability

StarStarStarStar

The principle that authorized users should have reliable and timely access to resources and information. It helps maintain productivity and service delivery.

StarStarStarStar

Intrusion Prevention System (IPS)

StarStarStarStar

A system that not only detects suspicious activity but also takes action to prevent the threat. It can block traffic from an IP address or quarantine a virus.

StarStarStarStar

Honeypot

StarStarStarStar

A decoy system intended to mimic likely targets of cyber attacks. It can be used to detect and analyze threats and deflect them from legitimate targets.

StarStarStarStar

Risk Assessment

StarStarStarStar

The process of identifying, analyzing, and evaluating risk. It helps organizations understand the potential impact of different security threats.

StarStarStarStar

Intrusion Detection System (IDS)

StarStarStarStar

A system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It helps in identifying potential security breaches.

StarStarStarStar

Malware

StarStarStarStar

Short for 'malicious software', it refers to any software designed to cause damage to a single computer, server, or computer network. Examples are viruses, worms, and Trojans.

StarStarStarStar

Zero-Day Exploit

StarStarStarStar

A cyber-attack targeting a software vulnerability that is unknown to the software vendor and has no patch available. It is significant because protection is difficult.

StarStarStarStar

Authorization

StarStarStarStar

The process of granting or denying specific privileges to an authenticated user or device. It defines what an authenticated entity is allowed to do.

StarStarStarStar

Encryption

StarStarStarStar

The process of converting plaintext into ciphertext to prevent unauthorized access. It protects data confidentiality during transmission or while at rest.

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.