Chapter 1 -itm 820

5.0(1)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

key security concepts

confidentiality, integrity, and availability

2
New cards

low impact of attack

A situation where a security breach results in minimal damage to an organization's operations, assets, or individuals.

3
New cards

moderate impact of attcack

A situation where a security breach leads to a significant disruption of operations, financial loss, or reputational damage to an organization.

4
New cards

high impact of attck

A situation where a security breach causes severe damage, potentially compromising critical operations, leading to substantial financial loss, regulatory penalties, or irreversible harm to an organization's reputation.

5
New cards

adversary(threat agent)

An individual or group that poses a potential threat to an organization's security by exploiting vulnerabilities for malicious purposes.

6
New cards

attack

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or information.

7
New cards

countermeasure

A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or the prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems

8
New cards

risk

A measure of the extent to which an entity is threatened by a potential circumstance or event. 1)the adverse impacts that would arise if the circumstances or event occurs. 2)the likelihood of occurrence

9
New cards

security policy

A set of rules and practices that specify how an organization manages, protects, and distributes sensitive information. It outlines the security measures and procedures to ensure the integrity, confidentiality, and availability of data.

10
New cards

systems resource (asset)

A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems
related group of systems.

11
New cards

Threath

A potential event or circumstance that could cause harm or loss to an organization.

12
New cards

vulnerability

A weakness or gap in a security program that can be exploited by threats to gain unauthorized access or cause harm to an organization.

13
New cards

Categories of vulnerabilities

-corrupted(integrity)

-leaky(confidentiality)

-very slow(availability)

14
New cards

Threaths

look for vulnerabilities

15
New cards

Passive attack

An attempt to gain unauthorized access to information without altering the system or data. This type of attack often involves eavesdropping on communications to gather sensitive information.

16
New cards

Active attack

An attempt to disrupt or compromise the integrity, confidentiality, or availability of a system by altering data or interfering with operations.

17
New cards

Insider attack

initiated by an entity inside the security parameter

18
New cards

outsider

initiated from outside the perimeter

19
New cards

Means to deal withs security attacks

-prevent

-detect

-recover

20
New cards

attacks surface categories

-network attack surface

-software attack surface

-human attack surface

21
New cards

security policy

Formal statement of
rules and practices
that specify or
regulate how a system
or organization
provides security
services to protect
sensitive and critical
system resources

22
New cards

security implementation

Involves four
complementary
courses of action:
• Prevention
• Detection
• Response
• Recovery

23
New cards

assurance

Encompassing both
system design and
system
implementation,
assurance is an
attribute of an
information system
that provides grounds
for having confidence
that the system
operates such that the
system’s security
policy is enforced

24
New cards

evaluation

Process of examining
a computer product or
system with respect
to certain criteria
• Involves testing and
may also involve
formal analytic or
mathematical
techniques
Computer Security
Strategy

25
New cards

strategies for computer security

-security implementation

-security policy

-evaluation

-assurance

26
New cards
27
New cards