Flashcards on Seguridad Informatica

Click on the flashcard to see the answer


What is the definition of information security?

It refers to the protection of digital or analog information and data from unauthorized access, theft, destruction or disclosure by implementing appropriate measures, policies and procedures.

What are the three basic concepts of information security?

Confidentiality, Integrity, and Availability (CIA)

What is authentication in the context of information security?

It is a process of verifying the identity of a user, device, or system attempting to access a computer or network.

What is authorization in the context of information security?

It is the process of granting access to a user, device, or system after authentication and determining the appropriate level of access required for that user.

What is an encryption in the context of information security?

It is the process of converting plain text into a coded message to secure and protect its contents from unauthorized access.

What is a firewall and how does it work?

It is a network security system that monitors and filters incoming and outgoing network traffic to prevent unauthorized access. It works by examining packets of data and deciding whether to allow or block them based on predefined rules.

What is a phishing attack?

It is a fraudulent activity in which an attacker creates a fake website or email to trick users into giving their sensitive information like passwords, social security numbers, etc.

What is malware?

It is a software designed to harm or exploit any computer system or network, including viruses, trojans, worms, and spyware.

What is a zero-day vulnerability?

It is a software vulnerability that is unknown to the software vendor and can be exploited by attackers before a patch or update is released.

What are the four types of access control in information security?

Mandatory Access Control, Role-Based Access Control, Discretionary Access Control, and Rule-Based Access Control

What is a Virtual Private Network (VPN)?

It is a secure and private connection between devices over the internet that allows users to access the internet safely away from prying eyes.

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption.

What is dumpster diving?

It is a physical method of obtaining private and confidential information by searching through a person's garbages or recycle bins.

What is ransomware?

It is a type of malware that blocks access to a system or data until a ransom is paid to the attacker.

What is multi-factor authentication?

It is a security process that requires users to provide two or more authentication factors to access a system or data.

What is the definition of information security?

It refers to the protection of digital or analog information and data from unauthorized access, theft, destruction or disclosure by implementing appropriate measures, policies and procedures.

What are the three basic concepts of information security?

Confidentiality, Integrity, and Availability (CIA)

What is authentication in the context of information security?

It is a process of verifying the identity of a user, device, or system attempting to access a computer or network.

What is authorization in the context of information security?

It is the process of granting access to a user, device, or system after authentication and determining the appropriate level of access required for that user.

What is an encryption in the context of information security?

It is the process of converting plain text into a coded message to secure and protect its contents from unauthorized access.

What is a firewall and how does it work?

It is a network security system that monitors and filters incoming and outgoing network traffic to prevent unauthorized access. It works by examining packets of data and deciding whether to allow or block them based on predefined rules.

What is a phishing attack?

It is a fraudulent activity in which an attacker creates a fake website or email to trick users into giving their sensitive information like passwords, social security numbers, etc.

What is malware?

It is a software designed to harm or exploit any computer system or network, including viruses, trojans, worms, and spyware.

What is a zero-day vulnerability?

It is a software vulnerability that is unknown to the software vendor and can be exploited by attackers before a patch or update is released.

What are the four types of access control in information security?

Mandatory Access Control, Role-Based Access Control, Discretionary Access Control, and Rule-Based Access Control

What is a Virtual Private Network (VPN)?

It is a secure and private connection between devices over the internet that allows users to access the internet safely away from prying eyes.

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption.

What is dumpster diving?

It is a physical method of obtaining private and confidential information by searching through a person's garbages or recycle bins.

What is ransomware?

It is a type of malware that blocks access to a system or data until a ransom is paid to the attacker.

What is multi-factor authentication?

It is a security process that requires users to provide two or more authentication factors to access a system or data.

Share


Login to Save


Share



Login to Save


Explore Other Decks


Made for Grade 8

Wefef Vocabulary


View Deck
Made for Grade 10

Correct Use of Prepositions in Compound Words


View Deck
Made for Grade 11

Building Language Idioms


View Deck

Explore More