Kategorier: Alle - malware - firewall - vulnerability

av Kosar Taha 12 år siden

330

Information Security ch. 5

The text delves into various concepts and terminologies central to information security. It describes Public Key Infrastructure (PKI) as a system used to authenticate internet communications, ensuring the sender or receiver'

Information Security ch. 5

Information Security ch. 5

Firewall

a method (hardware or software) of guarding a private network from a public network (internet) by analyzing data packets entering or exiting it.

PKI

a system to identify and authenticate the sender or receiver of an internet message or transaction

Back up

: a duplicate copy of data programs kept in a secured location.

DDOS

: an attack in which a system is bombarded with so many requests

Zombie

Vulnerability

weaknesses that threatens the confidentiality, integrity, or availability of an asset.

Threat

Threat is something or someone that may result in harm to an asset.

Spyware

Stealth software that gathers information about a user or a user’s online activity

Malware

malicious software, such as a virus, worm, or Trojan horse.

Audit

the process of generating, recording, and reviewing a chronological record of a system events to ascertain their accuracy.

Exposure

the estimated cost, loss, or damage that can result if a threat exploits a vurnerability

Risk management

Process of identifying, assessing, and reducing risk to an acceptable level

CIA triad

the three main principles of IT security

Risk

probability of a threat exploiting vulnerability