1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information
data has been process and organized to add meaning and context
Assurance
positive declaration intended to provide confidence and proof that security means are effective
Security
the protection of systems, networks and data from unauthorized access, attacks, damage, or theft
IT Security Specialist
responsible for securing the company’s technology from cyber attacks
Confidentiality
preserving authorized restrictions on access and disclosure
Integrity
protect against improper information modifications or damage and includes ensuring information
Availability
means those who needed accessed information are allowed to access it. Information should information systems, be available to those who are aware of the associated risks
Authentication
process of verifying that users or systems are who they claim to be. It ensures that the authorized individuals or systems can be accessed specific information resources.
Non-reputation
a security concepts that ensures proof of the origin and integrity of data, making it difficult deny the source and authenticity of a message
Information Security
the practice of depending/data protection
Information Assurance
an act securing that data is not lost
IT Security
information security applied technology
Principles of Security
the cia triad embodies the three concepts: CONFIDENTIALITY, INTEGRITY, AVAILABILITY
Protection
about putting up defenses to keep bad things away from your data and system.
Privacy
helps ensures that the only right people
Resilience
backup plan in case