Chapter 1 - Introduction Flashcards
assets
items you value
vulnerability
a weakness in the system that might be exploited to cause loss or harm.
threat
a set of circumstances that has the potential to cause loss or harm
attack
A human who exploits a vulnerability
availability:
the ability of a system to ensure that an asset can be used by any authorized parties
integrity:
the ability of a system to ensure that an asset is modified only by authorized parties
confidentiality:
the ability of a system to ensure that an asset is viewed only by authorized parties
authentication:
the ability of a system to confirm the identity of a sender
nonrepudiation or accountability
the ability of a system to confirm that a sender cannot convincingly deny having sent something
Auditability
ability of a system to trace all actions related to a given asset.
subject
the person, process, or program
object
the data item
access mode
the kind of access (such as read, write,
or execute)
the authorization
policy
Nonmalicious
someone’s accidentally spilling a soft drink on a laptop, unintentionally deleting text, inadvertently sending an email message to the wrong person, and carelessly typing “12” instead of “21” when entering a phone number or clicking “yes” instead of “no” to overwrite a file.