Exam 1 Flashcards
Asset
Organizational resource that is being protected. Can be logical, such as a web site, software information, or data; can be physical, such as a person, computer system, hardware, or other tangible object. Assets, particularly information assets, are the focus of what security efforts are attempting to protect.
Information Asset
Focus of information security; information that has value to the organization, and the systems that store, process, and transmit the information.
Information Security (InfoSec)
Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology.
Security
State of being secure and free from danger or harm. In addition, the actions taken to make someone or something secure.
Accountability
Access control mechanism that ensures all actions on a system - authorized or unauthorized - can be attributed to an authenticated identity. Also known as audibility.
Authentication
Access control mechanism that requires the validation and verification of an unauthenticated entity’s purported identity.
Authorization
Access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.
Availability
Attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.
C.I.A. Triad
Industry standard for computer security since the development of the mainframe. The standard is based on three characteristics that describe the utility of information: confidentiality, integrity, and availability.
Confidentiality
Attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems.
Disclosure
In information security, the intentional or unintentional exposure of an information asset to unauthorized parties.
Identification
Access control mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system.
Information Aggregation
Collection and combination of pieces of non private data, which could result in information that violates privacy. Not to be confused with aggregate information.
Integrity
Attribute of information that describes how data is whole, complete, and uncorrupted.
Privacy
In the context of information security, the right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality.
Attack
Intentional or unintentional act that can damage or otherwise compromise information and the systems that support it. Threat Event.
Exploit
Technique used to compromise a system. This term can be a verb or noun. Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain.
Loss
Single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.
Threat
Any event or circumstance that has the potential to adversely affect operations and assets. The term threat source is commonly used interchangeably with the more generic term threat.
Threat Agent
Specific instance or a component of a threat.
Vulnerability
Potential weakness in an asset or its defensive control system(s).
Intellectual Property (IP)
Creation, ownership, and control of original ideas as well as the representation of those ideas.
Software Piracy
Unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.
Availability Disruption
Interruption in service, usually from a service provider, which causes an adverse event within an organization.