Chapter 1 Flashcards
Data Confidentiality (Confidentiality)
Assures that private or confidential information is not made available or disclosed to unauthorized individuals
Privacy (Confidentiality)
Assure that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed
Data integrity (Integrity)
Assures that information and programs are changed only in a specified and authorized manner
System integrity (Integrity)
Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system
Availability
Assures that systems work promptly and service is not denied to authorized users
Authenticity
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
Accountability
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes
Adversary (threat agent)
An entity that attacks, or is a threat to, a system.
Attack
An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system
Countermeasure
An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken
Risk
An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.
Security Policy
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
System Resource (Asset)
Data contained in an information system; or a service provided by a system; or a system capability, such as processing power or communication bandwidth; or an item of system equipment (i.e., a system component - hardware, firmware, software, or documentation); or a facility that houses system operations and equipment.
Threat
A potential for violation of security, which exists when there is a circumstance, capability, action, or event, that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.
Vulnerability
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy
Unauthorized Disclosure
A circumstance or event whereby an entity gains access to data for which the entity is not authorized
Exposure (Unauthorized Disclosure)
Sensitive data are directly released to an unauthorized entity
Interception (Unauthorized Disclosure)
An unauthorized entity directly access sensitive data traveling between authorized sources and destinations
Inference (Unauthorized Disclosure)
A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or by-products of communications
Intrusion (Unauthorized Disclosure)
An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.
Deception
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true
Masquerade (Deception)
An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.