Chapter 1: Intro to Information Security Flashcards
Define: Confidentiality
Who has access to what resources
Define: Integrity
The data/resource has not been changed/tampered
Define: Availability
Data/resource is available when needed and to those that are authorized
What is the triple AAA of Principles of Security?
Authenticiation, Authorization, Accounting
Define: Authentication
Those who have authentic credentials
Define: Authoriztion
Permission to take action (after login)
Define Accounting
Record of authorization (audit)
Threat Vector
Surface of where a threat actor(s) work on
Vulnerabliltiy
Possibility of being attacked or harmed
What is a Framework?
Documented processes that define policy and procedures for implementation and management of security controls
What is a threat actor?
Entity that is responsible for the attack
What is Shadow IT?
Bypassing corporate approval for technology purchases