1 - Overview of Security Flashcards
Information Security
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction
Information Systems Security
Act of protecting the systems that hold and process our critical data
CIA triad
Confidentiality, Integrity, Availability
Confidentiality
Information has not been disclosed to unauthorized people
Integrity
Information has not been modified or altered without proper authorization
Availability
Information is able to be store, accessed, or protected at all times
What is the AAA of security
Authentication, Authorization, Accounting
Authentication
When a person’s identity is established with proof and confirmed by a system
Authorization
Occurs when a user is given access to a certain piece of data or certain areas of. a building
Accounting
Tracking of data, computer usage, and network resources
What are the four types of security threats
Malware, Unauthorized Access, System Failure, and Social Engineering
What is Malware
short-hand term for malicious software
What is unauthorized access
Occurs when access to computer resources and data occurs without the consent of the owner
What is system failure
occurs when a computer crashes or an individual application fails
What is social engineering
act of manipulating users into revealing confidential information or performing other detrimental actions