1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
-a method of protecting and controlling the risks associated with private data while it is being delivered, processed, and stored.
-primarily concerned with making sure the information system operates as required while maintaining security that authorized users may access.
Information Assurance
-the process of protecting data by minimizing information risks, which includes eliminating the likelihood of misuse or unauthorized access to data.
-main focus of information security is providing balanced protection against cyber attacks and hacking while maintaining CIA of data.
Information Security
is keeping disclosure and permitted access boundaries in place, protecting private data, and protecting individual privacy.
Confidentiality
comprises preventing unauthorized modification or removal and guaranteeing the authenticity and non-repudiation of data.
Integrity
ensures reliable access to information at the appropriate time
Availability
Technology brings impactful changes that can make business flourish.
Foundation of Security
A number of frameworks, including those from the National Institute of Standards and Technology (NIST), assist organizations in putting security measures in place and reducing risks.
Security Frameworks
To create safe systems, it is essential to comprehend_______________ design principles.
Software Security
Effective cybersecurity management requires an understanding of potential ___________
Threats and Vulnerabilities
This entails employing technologies, procedures, and policies to defend networks, systems, and data against cyberattacks.
Cybersecurity
Security plays a vital role in our daily lives. It is essential to protect us, our families, our homes, and our businesses. Security covers a wide variety of issues, from ensuring our physical safety and protection to securing our digital data and privacy
Importance of Security
CIA Triad 3
Confidentiality
Integrity
Availability
Foundation of Security 3
Security Frameworks
Software Security
Threats and Vulnerabilities
Cybersecurity