LECTURE NOTE 1 Flashcards
(82 cards)
the immunity from any risk or danger that may have undesired outcome
security
put in place to safeguard what is valuable from potential harm
security measures
the ability to be able to look for and identify potential or actual compromise
security mindset
refers to specifically the protection from computer systems and devices from threats such as unauthorized access, use, modification, or destruction; involves protecting the hardware, software, and data that make up a
computer system
computer security
A term covering the protection of information and systems from threats like hacking, malware, theft, or hardware damage, ensuring the confidentiality, integrity, and availability of information throughout its lifecycle. includes the protection of all types of information
and information systems, not just computers
information security
CIA Triad
fundamental concept/security model in information
security and stands for three core principles: confidentiality, integrity,
and availability
Restricting access to systems and data to only authorized parties, protecting
sensitive information from unauthorized disclosure
confidentiality
protecting data from unauthorized or improper modification, maintaining
the trustworthiness and accuracy of the information.
integrity
Ensuring that systems and resources are accessible to authorized users when
needed, and that services are not denied to them, particularly during
emergencies or disasters.
availability
What additional characteristics are important in modern information security?
Authenticity, Accountability, Non-repudiation, Reliability
loss of confidentiality
the unauthorized disclosure of information.
loss of integrity
the unauthorized modification or destruction of information
loss of availability
the disruption of access to or use of information or
an information system
informational self-determination
you get to control information about you
the entire set of hardware, software data,
people, procedures, and networks that enable a business to use
information.
information system (IS)
is the practice of
protecting information by mitigating information risks
information security
things we might want to protect (anything of value)
asset
the assets of a computer system
hardware, software, data, communcation facilities and networks
weaknesses or gaps in the security system that could be
exploited to cause loss or harm
vulnerabilites
example of loss of integrity
system can be corrupted, does the wrong thing or gives wrong answers
example of loss of confidentiality
system can become leaky
example of loss of availability
system can become unavailable or very slow
potentials for vulnerabilities to turn into attacks on systems
threats
an actions which exploits a vulnerability to execute a threat ( threats carried out ); lead to compromises ot security breaches
attacks