Java Games: Flashcards, matching, concentration, and word search.

MTA 98-367 Fund of Sec Lesson 1 key terms activity

AB
access controlThe process of restricting access to a resource to only permitted users, applications, or computer systems.
attack surfaceThe exposure, the reachable and exploitable vulnerabilities that a system or technology has.
availabilityDescribes a resource being accessible to a user,application, or computer system when required. In other words, availability means that when a user needs to get to information,he or she has the ability to do so.
confidentialityThe characteristic of a resource ensuring access is restricted to only permitted users, applications, orcomputer systems.
defense in depthUsing multiple layers of security to defend your assets.
flash driveA small drive based on flash memory.
integrityThe consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes.
keyloggerA physical or logical device used to capture keystrokes.
mobile deviceSmall devices that are used to process information, send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with internal networks and systems. They include laptops, PDAs (personal digital assistants), and smartphones.
principle of least privilegeA security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.
removable deviceA storage device that is designed to be taken out of a computer without turning the computer off.
residual riskThe risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event.
riskThe probability that an event will occur. In reality, businesses are concerned only about risks that would negatively impact the computing environment.
risk acceptanceThe act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk.
risk assessmentIdentifies the risks that might impact your particular environment.
risk avoidanceThe process of eliminating a risk by choosing not to engage in an action or activity.
risk managementThe process of identifying, assessing, and prioritizing threats and risks.
risk mitigationTaking steps to reduce the likelihood or impact of a risk.
risk transferThe act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing.


Business & IT Teacher
Spotsylvania High School
Spotsylvania, VA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities