Chapter1 Flashcards
The protection afforded to an automated information system in order to attain the applicable objectives of perserving the integrity, availability and confidentiality of information system resources
Computer Security
The CIA triad
- confidentiality
- integrity
- availability
Confidentiality covers:
- Data confidentiality
- Privacy
Integrity covers:
- Data Integrity
- System Integirty
Preserving authorized restrictions on information access and disclosure
Confidentiality
Guarding against improper information modification or destruction
integrity
Ensuring timely and reliable access to and use of information
Availability
Levels of impact:
Low, Moderate and High
The loss could be expected to have a limited adverse effect on organizational operations, assets or individuals
low impact
The loss could be expected to have a serious adverse effect on organizational operations, assets or individuals
moderate impact
The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, assets or individuals
High impact
An entity that attacks, or is a threat to, a system
Adversary
An assault on system security that derives from an intelligent threat
Attack
An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it.
Countermeasure
An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.
Risk