Cards Return to set Details
hatchet information Security |
Definition a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002) | Term goal of information Security | Definition maintain the status quo, maintain the security, maintain the liveness | Term | Definition is “the top quality or state of gift secure--to be free from danger.” | Term | Definition Physical defense – To safeguard the physics items, objects, or areas of an company from unauthorized accessibility and misuse.
You are watching: The possession of information is the quality or state of having value for some purpose or end.
Personal defense – To safeguard the separation, personal, instance or team of individuals who are authorized to accessibility the organization and also its operations. Operations defense – To protect the details of a particular operation or collection of activities. Communications protection – To defend an organization’s interactions media, technology, and content. Network protection – To defend networking components, connections, and also contents. | Term | Definition Confidentiality verity Availability | Term Critical qualities of Information | Definition Availability – allows users who need to accessibility information to carry out so without interference or obstruction and in the forced format. The information is said to be available to an authorized user when and where needed and also in the correct format. Accuracy – free from failure or error and also having the worth that the end user expects. If information contains a value different from the user’s expectations as result of the intentional or unintentional alteration of its content, it is no much longer accurate. Authenticity –The high quality or state that being real or original, quite than a reproduction or fabrication. Info is authentic as soon as it is the information that was initially created, placed, stored, or transferred. Confidentiality – The top quality or state of staying clear of disclosure or exposure to unauthorized people or systems. Integrity – The high quality or state of being whole, complete, and also uncorrupted. The verity of information is threatened once the info is exposed come corruption, damage, destruction, or various other disruption of its really state. Utility – The quality or state of having actually value for some objective or end. Information has value when it serves a details purpose. This method that if details is available, however not in a format coherent to the end user, that is no useful. Possession – The top quality or state of having actually ownership or manage of part object or item. Details is stated to be in possession if one obtains it, live independence of style or other characteristic. When a breach that confidentiality always results in a breach the possession, a breach the possession does no always an outcome in a breach the confidentiality. | Term components of an info System | Definition hardware, software, data, procedures, people- easiest to hardest to change | Term Systems development Life bike (SDLC): | Definition a methodology for the design and also implementation that an info system in an organization. | Term | Definition Responsible for the security and also use the a particular set of information. | Term | Definition Responsible because that the storage, maintenance, and protection of the information. | Term | Definition The end systems customers who occupational with the information to perform their everyday jobs supporting the mission the the organization. | Term | Definition a topic or object’s capacity to use, manipulate, modify, or influence another topic or object. | Term | Definition the organizational source that is gift protected. | Term | Definition an act the is an intended or unintentional effort to reason damage or damage to the details and/or the equipment that support it. | Term Control, Safeguard, or Countermeasure | Definition security mechanisms, policies, or measures that can successfully counter attacks, mitigate risk, settle vulnerabilities, and also otherwise improve the defense within one organization. | Term | Definition to take benefit of weakness or vulnerability in a system. | Term | Definition a single instance that being open up to damage. | Term | Definition Good: come use computer systems or solution for enjoyment; Bad: to illegally gain access to a computer or system. | Term | Definition a passive reality in the information system that receives or consists of information. | Term | Definition an individual who “cracks” or removes the software defense from an applications designed to prevent unauthorized duplication. | Term | Definition the probability the something have the right to happen. | Term | Definition the setup for the implementation of brand-new security procedures in the organization. | Term | Definition a collection of details security rules the represents the implementation the a defense policy. | Term security Posture or defense Profile | Definition | Term | Definition - an energetic entity that interacts with an details system and also causes info to relocate through the system for a details end purpose | Term | Definition a group of objects, persons, or various other entities that represents a potential risk to an asset. | Term | Definition a specific instance or component of a more general threat. | Term | Definition weaknesses or faults in a device or protection mechanism that expose information to attack or damage. | Term | Definition “the ownership of ideas and control end the tangible or virtual depiction of those ideas.” | Term software application piracy | Definition the unlawful usage or duplication the software-based intellectual property | Term | Definition hacks the general public telephone network come make free calls, disrupt services, and generally wreak havoc. | Term | Definition a intentional act that exploits vulnerability | Term | Definition redirection the legitimate web traffic (e.g., internet browser requests) come illegitimate website for the objective of obtaining exclusive information | Term | Definition relatively new; functions by exploring materials of a net browser’s cache to produce malicious cookie |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |