Chapter 1 Flashcards
information security
The act of protecting information from unauthorized access
confidentiality
Preventing the disclosure of information to unauthorized persons
integrity
authorization is necessary before data can be modified
availability
Data is obtainable regardless of how information is stored, accessed, or protected.
authentication
When a person’s identity is confi rmed
authorization
When a user is granted access to specifi c resources after authentication is
complete.
accounting
The tracking of data, computer usage, and network resources.
non-repudiation
idea of ensuring that a person or group cannot refute the validity
of your proof against them.
defense in depth
The building up and layering of security measures that protect data
from inception, on through storage and network transfer, and lastly to fi nal disposal.
white hat
A type of hacker that is contracted to break into a company’s system.
ethical hacker
An expert at breaking into systems and can attack systems on behalf of
the system’s owner and with the owner’s consent.
black hat
A hacker that breaks into computer systems without permission, with the
express purpose of theft, piracy, credit card fraud, or other illegal activities.