1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Confidentiality
Information should only be accessed by authorized individuals.
Integrity
Information must be maintained accurately, consistently, and reliably so it is useful for its purpose.
Availability
Information and systems should be accessible to authorized users whenever needed.
Asset
The organizational resource that is being protected.
Threat
The possibility of theft or vandalism.
Threat agent
the specific instance or a component of a threat.
Vulnerability
weaknesses or faults in a system or protection mechanism that expose information to attack or damage.
Exploit
a technique used to compromise a system.
Exposure
a condition or state of being exposed.
Loss
a single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.
Risk
the probability of an unwanted occurrence.
Access
A subject or object’s ability to use, manipulate, modify, or affect another subject or object.
Attack
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it
Control, safeguard, or countermeasure
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.
Subjects and objects
A computer can be either an agent entity used to conduct an attack or the target entity.
Protection profile or security posture
Entire set of controls and safeguards that the organization implements to protect the asset.
Threat source
A category of objects, people, or other entities that represents a danger to an asset
Threat Event
An occurrence of an event caused by a threat agent.
information security
Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. (which includes computer security, data security, and network security)