Chapter 1 Flashcards
Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security
The requirements that are set forth by laws and industry regulations
Compliance
C.I.A.
Confidentiality
Integrity
Availability
Allowing only those authorized to access the data requested
Confidentiality
Keeping data unaltered by Accidental or Malicious intent
Integrity
The ability to access data when needed
Availability
The physical disposition of the media on which the data is stored
Possession/Control
Allows you to say whether you’ve attributed the data in question to the proper owner or creator
Authenticity
How useful the data is
Utility
Attacks that allow unauthorized users to access your data, applications, or environments, and are primarily an attack against confidentiality
Interception
Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.
Interruption
Attacks that involve tempering with assets.
Modification
Attacks that involve generating data, processes, communications, or other similar activities with a system.
Fabrication
The likelihood that an event will occur
Risk
Events that could cause damage to assets
Threats
A weakness that a threat event of the threat agent can take advantage of
Vulnerabilities
An additional step that is taking into account the value of the asset being threatened
Impact
Protecting the physical environment in which your system sits, or where your data is stored.
Physical Control
Protects the systems, networks, and environments that process, transmit, and store your data
Technical/Logical Control
Dictate how users of your environment should behave and are based on rules, laws, policies, procedures and guidelines
Administrative Control
A model that adds three more principles to the CIA triad.
Parkerian Hexad
Three principles added to the C.I.A.by the Parkerian Hexad
Possession/Control
Utility
Authenticity
Forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.
Risk Management
Risk Management Processes
Identify Assets
Identify Threats
Assess Vulnerability
Assess Risks
Mitigate Risks