1/10
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
confidentiality
information in a system may be disclosed or made accessible to people or programs that are unauthorised to access that information
integrity
information in a system may be damaged or corrupted making it inconsistent or unreliable
availability
access to a system or its data may be unavailable
infrastructure security
concerned with maintaining the security of all systems and networks that provide an infrastructure to the organization
application security
concerned with the security of individual application systems or related groups of systems
operational security
concerned with the secure operation and use of the organization’s systems
risk avoidance requirements
design the system so these risks cannot arise
risk detection requirements
mechanisms that identify the risk if it arises and neutralise it before losses occur
risk mitigation requirements
system should be designed to recover from losses
protection
how should the system be organized so critical assets can be protected against external attack?
distribution
how should system assets be distributed so that the effects of a successful attack are minimised?