Cards Return to set Details

hatchet information Security
Definition a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002)‏
Term goal of information Security

maintain the status quo, maintain the security, maintain the liveness

Term defense
Definition is “the top quality or state of gift secure--to be free from danger.”
Term elements of Security


Physical defense – To safeguard the physics items, objects, or areas of an company from unauthorized accessibility and misuse.

You are watching: The possession of information is the quality or state of having value for some purpose or end.

Personal defense – To safeguard the separation, personal, instance or team of individuals who are authorized to accessibility the organization and also its operations.

Operations defense – To protect the details of a particular operation or collection of activities.

Communications protection – To defend an organization’s interactions media, technology, and content.

Network protection – To defend networking components, connections, and also contents.

Term C.I.A.
Definition Confidentiality verity Availability

Critical qualities of Information



Availability – allows users who need to accessibility information to carry out so without interference or obstruction and in the forced format. The information is said to be available to an authorized user when and where needed and also in the correct format.

Accuracy – free from failure or error and also having the worth that the end user expects. If information contains a value different from the user’s expectations as result of the intentional or unintentional alteration of its content, it is no much longer accurate.

Authenticity –The high quality or state that being real or original, quite than a reproduction or fabrication. Info is authentic as soon as it is the information that was initially created, placed, stored, or transferred.

Confidentiality – The top quality or state of staying clear of disclosure or exposure to unauthorized people or systems.

Integrity – The high quality or state of being whole, complete, and also uncorrupted. The verity of information is threatened once the info is exposed come corruption, damage, destruction, or various other disruption of its really state.

Utility – The quality or state of having actually value for some objective or end. Information has value when it serves a details purpose. This method that if details is available, however not in a format coherent to the end user, that is no useful.

Possession – The top quality or state of having actually ownership or manage of part object or item. Details is stated to be in possession if one obtains it, live independence of style or other characteristic. When a breach that confidentiality always results in a breach the possession, a breach the possession does no always an outcome in a breach the confidentiality.

Term components of an info System

hardware, software, data, procedures, people- easiest to hardest to change

Term Systems development Life bike (SDLC):
Definition a methodology for the design and also implementation that an info system in an organization.
Term Data Owner
Definition Responsible for the security and also use the a particular set of information.
Term Data Custodian
Definition Responsible because that the storage, maintenance, and protection of the information.
Term Data users
Definition The end systems customers who occupational with the information to perform their everyday jobs supporting the mission the the organization.
Term Access
Definition a topic or object’s capacity to use, manipulate, modify, or influence another topic or object.
Term Asset
Definition the organizational source that is gift protected.
Term Attack
Definition an act the is an intended or unintentional effort to reason damage or damage to the details and/or the equipment that support it.
Term Control, Safeguard, or Countermeasure
Definition security mechanisms, policies, or measures that can successfully counter attacks, mitigate risk, settle vulnerabilities, and also otherwise improve the defense within one organization.
Term Exploit
Definition to take benefit of weakness or vulnerability in a system.
Term Exposure
Definition a single instance that being open up to damage.
Term Hack
Definition Good: come use computer systems or solution for enjoyment; Bad: to illegally gain access to a computer or system.
Term object
Definition a passive reality in the information system that receives or consists of information.
Term cracker
Definition an individual who “cracks” or removes the software defense from an applications designed to prevent unauthorized duplication.
Term hazard
Definition the probability the something have the right to happen.
Term security Blueprint
Definition the setup for the implementation of brand-new security procedures in the organization.
Term Security model
Definition a collection of details security rules the represents the implementation the a defense policy.
Term security Posture or defense Profile
Definition a basic label for the combination of all policies, procedures, technologies, and also programs that comprise the total security effort right now in place.

See more: The Independent Variable Is Associated Mainly With, Independent Variable

Term topic
Definition - an energetic entity that interacts with an details system and also causes info to relocate through the system for a details end purpose
Term Threats
Definition a group of objects, persons, or various other entities that represents a potential risk to an asset.
Term threat Agent
Definition a specific instance or component of a more general threat.
Term Vulnerability
Definition weaknesses or faults in a device or protection mechanism that expose information to attack or damage.
Term intellectual property
Definition “the ownership of ideas and control end the tangible or virtual depiction of those ideas.”
Term software application piracy
Definition the unlawful usage or duplication the software-based intellectual property
Term phreaker
Definition hacks the general public telephone network come make free calls, disrupt services, and generally wreak havoc.
Term Attack
Definition a intentional act that exploits vulnerability
Term Pharming
Definition redirection the legitimate web traffic (e.g., internet browser requests) come illegitimate website for the objective of obtaining exclusive information
Term timing attack
Definition relatively new; functions by exploring materials of a net browser’s cache to produce malicious cookie