isa\ Flashcards
(75 cards)
Items of fact collected by an organization. Data includes
raw numbers, facts, and words. Student quiz scores are a simple
example of data.
Data
The unauthorized taking of personally
identifiable information with the intent of committing fraud and
abuse of a person’s financial and personal reputation,
purchasing goods and services without authorization, and
generally impersonating the victim for illegal or unethical
purposes
Identity Theft
was the first widely recognized
published document to identify the role of management and
policy issues in computer security.
RAND Report R-609
The model, which was created by John
McCumber in 1991, provides a graphical representation of the
architectural approach widely used in computer and
information security,
McCumber Cube- T
are rules that mandate or prohibit certain behavior and
are enforced by the state.
Laws-
In 1973, An Internet pioneer identified
fundamental problems with ARPANET security.
Robert M. Metcalfe
a well-informed sense of assurance that
the Information risk and controls are in balance.
Information Security
is a potential weakness in an asset or its
defensive control system(s).
Vulnerability
measures that an organization takes to ensure every
employee knows what is acceptable and what is not
Due care
Reasonable steps taken by people or
organizations to meet the obligations imposed by laws or
regulations.
Due diligence
In the context of information security, the right of
individuals or groups to protect themselves and their
information from unauthorized access, providing
confidentiality.
Privacy
The power to make legal decisions and
judgments; typically, an area within which an entity such as a
court or law enforcement agency is empowered to make legal
decisions
Jurisdiction
An entity’s legal obligation or responsibility
Liability
A legal requirement to make compensation or
payment resulting from a loss or injury
Restitution
Attack can be intentional or unintentional act that can damage
or otherwise compromise information and the systems that
support it. Attacks can be active or passive and direct or
indirect
Attack
The creation, ownership, and
control of original ideas as well as the representation of those
ideas.
Intellectual property (IP)
model
of information security evolved from a concept developed by
the computer security industry called the C.I.A. triad.
The Committee on National Security Systems (CNSS)
has been the standard for computer security in both
industry and government since the development of the
mainframe.
C.I.A. triad
means the need to secure the physical
location of computer technology from outside threats.
Computer Security
a collection of related data stored in a structured
form and usually managed by a database management system.
Database
During the Cold War, many more mainframe
computers were brought online to accomplish more
complex and sophisticated tasks.
1960’s
These mainframes required a less cumbersome process
of communication than mailing magnetic tapes
between computer centers
1960’s
In response to this need, the Department of Defense’s
Advanced Research Projects Agency (ARPA) began
examining the feasibility of a redundant, networked
communications system to support the military’s
exchange of information.
1960’s
developed the ARPANET
(Advanced Research Projects Agency Network)
project
In 1968, Dr. Larry Roberts