Reviewer

Focuses on protecting digital information
Information Security
Cyber Security
Application of technologies, processes, and controls
Information Security
Cyber Security
Sensitive and private information is only accessible to authorized individuals.
Confidentiality
Integrity
Maintaining the accuracy and reliability of data.
Confidentiality
Integrity
Information and systems are accessible and operational when needed.
Availability
Confidentiality
Encompasses a wide range of practices.
Information Security
Cyber security
Fundamental processes to control access to systems and data.
Cryptography
Authentication and Authorization
Assigning appropriate access rights to authorized users.
Authorization
Authentication
Converting information into unreadable formats that an only decrypted by authorized parties.
Cryptography
IDS
 
 
 
 
Barriers between trusted internal networks and untrusted external networks.
Firewalls and Intrusion Detection System (IDS)
Authorization
Identifying weaknesses in systems and networks through assessments.
Security Policies and Procedures
Vulnerability
Educating users about security best practices
Security Awareness Training
Security Assessment Training
Developing plans to respond
Incident Response and Recovery
Incident Recovery and Response
Subject to specific security regulations and standards
Regulatory Compliance
Casual Compliance
Securing data stored in and accessed through cloud services
Cloud Security
Cloud Firewall
With the proliferation of mobile devices
Android Security
Mobile Security
Types if malicious software(viruses, worms, ransomware) and their impact.
Malware
Firewall
Deceive individuals and gain unauthorized access.
Social Engineering
Computer Engineering
Fraudulent attempts to obtain sensitive information
Phishing
Fishing
Sensitive information is exposed due to security vulnerabilities.
Data Breaches
Mobile Data
Risks posed by individuals
Outsider Threats
Insider Threats
Creating and managing robust passwords
Strong password
Weak Password
Protecting data by converting it into a code
Decryption
Encryption
Keeping software to sensitive information
Casual Updates
Regular Updates
Limiting access to sensitive information
Access control
Deny control
Educating employees about security risks
Security Awareness Workshop
Security Awareness Training
Developing a plan to address security
Incident Response
Accident Response
{"name":"Reviewer", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Focuses on protecting digital information, Application of technologies, processes, and controls, Sensitive and private information is only accessible to authorized individuals.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.