Information Security ch. 5
Firewall
a method (hardware or software) of guarding a private network from a public network (internet) by analyzing data packets entering or exiting it.
PKI
a system to identify and authenticate the sender or receiver of an internet message or transaction
Back up
: a duplicate copy of data programs kept in a secured location.
DDOS
: an attack in which a system is bombarded with so many requests
Zombie
Vulnerability
weaknesses that threatens the confidentiality, integrity, or availability of an asset.
Threat
Threat is something or someone that may result in harm to an asset.
Spyware
Stealth software that gathers information about a user or a user’s online activity
Malware
malicious software, such as a virus, worm, or Trojan horse.
Audit
the process of generating, recording, and reviewing a chronological record of a system events to ascertain their accuracy.
Exposure
the estimated cost, loss, or damage that can result if a threat exploits a vurnerability
Risk management
Process of identifying, assessing, and reducing risk to an acceptable level
CIA triad
the three main principles of IT security
Risk
probability of a threat exploiting vulnerability