CIS 475 Quiz 1

5.0(1)
studied byStudied by 9 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Confidentiality

Information should only be accessed by authorized individuals.

2
New cards

Integrity

Information must be maintained accurately, consistently, and reliably so it is useful for its purpose.

3
New cards

Availability

Information and systems should be accessible to authorized users whenever needed.

4
New cards

Asset

The organizational resource that is being protected.

5
New cards

Threat

The possibility of theft or vandalism.

6
New cards

Threat agent

the specific instance or a component of a threat.

7
New cards

Vulnerability

weaknesses or faults in a system or protection mechanism that expose information to attack or damage.

8
New cards

Exploit

a technique used to compromise a system.

9
New cards

Exposure

a condition or state of being exposed.

10
New cards

Loss

a single instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.

11
New cards

Risk

the probability of an unwanted occurrence.

12
New cards

Access

A subject or object’s ability to use, manipulate, modify, or affect another subject or object.

13
New cards

Attack

An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it

14
New cards

Control, safeguard, or countermeasure

Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve security within an organization.

15
New cards

Subjects and objects

A computer can be either an agent entity used to conduct an attack or the target entity.

16
New cards

Protection profile or security posture

Entire set of controls and safeguards that the organization implements to protect the asset.

17
New cards

Threat source

A category of objects, people, or other entities that represents a danger to an asset

18
New cards

Threat Event

An occurrence of an event caused by a threat agent.

19
New cards

information security

Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. (which includes computer security, data security, and network security)