Chapter 1 Flashcards
What is the CIA triad
Confidentiality
Integrity
Availablity
of data and services
What is confidentiality
Resitrictions on information, access, and disclosure including means to protect personal privacy and propietary information
what is integrity
guarding agains improper information modification or destruction ensuring information nonrepudation and authentticiy
what is availablity
ensuring timely and reliable access to and use information
what is a secuity policy
a set of practices and rules that specify and regulate how a system or organization provides security services to protect senstiive and critial system resources
what are 4 assets of a computer system, (components)
What type of vulnerability is corrupted data
integrity
what type of vulnerability is leaky
loss of confidentiality
what is a passive attack
attempt to learn or make use of information from the sys that does not affect sys resources
what is an active attack
attempt to alter sys resources or affect their operation
What are the 3 ways to deal with secutiy attacks
prevent, detect, recover
what is unauthorized disclousure
what is deception (type of threat)
what is disruption
what is usurpation