Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen Information Security Kurs an der Western Governors University zu.
Attacks consist of three main elements.
Type of Attack
Risk from Attack
Control of the Attack
Steps for Risk Management
What is compliance in the Cloud setting
The risk is shared and is portional to how much control over the settings the client has.
Kerckhoff's 2nd principle in today's terms
Even if people know every bit of the system (except the key) they still should not be able to get in.
Define Digital Certificate
created to link a public key to a particular person.
requires a public key and identifying information (name/address) then having them signed by a Certificate Authority (CA)
What is PII?
Personally Identifiable Information
Calculates the value of the asset and compares it to the risk.
What is a One-Time Pad
aka Vernam Cipher
two copies of the key showing the shifts needed. Used for encryption and decryption
Primitive type of Stream Cipher
Elements of a High Level Incidence Reponse Process
Detection and Analysis
List 4 security benefits for Accountability
3. Detection & Prevention
4. Admissibility or Records
Two types of Symmetric Cryptography
1. Block Cipher
2. Stream Cipher
What is DRP
Disaster Recovery Plan
exactly what to do during and after a disaster
Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.Jetzt loslegen