Domain 1: Security and Risk Management Flashcards
(111 cards)
Confidentiality
Seeks to prevent the unauthorized disclosure of information: it keeps data secret.
Integrity
Seeks to prevent unauthorized modification of information. In other words, seeks to prevent unauthorized write access.
Availability
Ensures that information is available when needed.
Subject
An active entity on an information system.
Object
A passive data file.
Annualized Loss Expectancy
The cost of loss due to a risk over a year.
Threat
A potentially negative occurrence.
Vulnerability
A weakness in a system.
Risk
A matched threat and vulnerability.
Safeguard
A measure taken to reduce risk.
Total Cost of Ownership
The cost of a safeguard.
Return on Investment
Money saved by deploying a safeguard.
Disclosure, alteration and destruction (DAD)
Opposite of CIA.
2 types of integrity?
Data integrity and system integrity
Data integrity
Seeks to prevent unauthorized modification of information.
System integrity
Seeks to prevent unauthorized modification of a system.
Disclosure
Unauthorized release of information.
Alteration
Unauthorized modification of data.
Destruction
Making systems or data unavailable.
AAA
Authentication, Authorization and Accountability
Identity
A claim of who you are. By itself it is weak because there is no proof.
Authentication
Proving an identity claim.
Authorization
Describes the actions you can perform on a system once you have been identified and authenticated.
Accountability
Holds users responsible for their actions.