Kategorie: Wszystkie - malware - firewall - vulnerability

przez Kosar Taha 13 lat temu

447

Information Security ch. 5

Information Security ch. 5

Information Security ch. 5

Firewall

a method (hardware or software) of guarding a private network from a public network (internet) by analyzing data packets entering or exiting it.

PKI

a system to identify and authenticate the sender or receiver of an internet message or transaction

Back up

: a duplicate copy of data programs kept in a secured location.

DDOS

: an attack in which a system is bombarded with so many requests

Zombie

An infected computer that is controlled remotely via the internet by an unauthorized user, such as a spammer, fraudster, or hacker.

Vulnerability

weaknesses that threatens the confidentiality, integrity, or availability of an asset.

Threat

Threat is something or someone that may result in harm to an asset.

Spyware

Stealth software that gathers information about a user or a user’s online activity

Malware

malicious software, such as a virus, worm, or Trojan horse.

Audit

the process of generating, recording, and reviewing a chronological record of a system events to ascertain their accuracy.

Exposure

the estimated cost, loss, or damage that can result if a threat exploits a vurnerability

Risk management

Process of identifying, assessing, and reducing risk to an acceptable level

CIA triad

the three main principles of IT security

Risk

probability of a threat exploiting vulnerability