1.2 Definitions Flashcards
Information Security
Act of protecting data and information from unauthorized access, unlawful modifications and disruption, disclosure and corruption, and destruction.
Information Systems Security
Act of protecting the systems that hold and process the critical data.
CIA pentagon
Confidentiality, Integrity, Availability, Non-repudiation, Authentication
Integrity
Ensure that data remains accurate and unaltered unless modification is required.
Availability
Ensures that information and resources are accessible and functional when needed by authorized users.
Non-repudiation
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.
AAA security
Authentication, Authorization, Accounting
Authentication
Process of verifying the identity of a user or system
Authorization
Define what actions or resources a user can access.