Chapter 1: What is Information Security? Flashcards
protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
Information Security
our ability to protect our data from those who are not authorized to view it.
Confidentiality
can be compromised by the loss of a laptop containing data, a person looking over our shoulder while we type a password, and email attachment being sent to the wrong person and the like
Confidentiality
the ability to prevent our data from being changed in an unauthorized or undesirable manner.
Integrity
can be compromised by the unauthorized change or deletion of our data or portions of our data etc.
Integrity
refers to the ability to access our data when we need it.
Availability
A more complex system for the CIA triad
Parkerian Hexad
refers to the physical disposition of the media on which the data is stored.
Possession or Control
enables without involving other factors such as availability to discuss our loss of the data in its physical medium
Possession or Control
allow us to talk about the proper attribution as to the owner or creator of the data in question.
Authenticity
reverse concept to authenticity
Nonrepudiation
refers to how useful the data is to us
Utility
attacks that allow unauthorized users to access our data, applications, or environments.
Interception
attack against confidentiality
Interception
attacks cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.
Interruption