Final Exam Flashcards
Determining identity via a trusted process
Authentication
Act of recognizing an authenticated person
Authorization
Allowing authorized person access to a resource
Access Control
Network hosts and valuable information
Asset
Something that allows user to attack and/or compromise the system
Vulnerability
Procedure used to exploit a vulnerability
Threat
Person, process, or host used to wage a threat
Threat Agent
Overall exposure experienced by a network or business
Risk
Event in which a threat exploits a vulnerability
Attack/incident exposure
Event in which a system loses integrity
Compromise
Procedure taken to minimize a vulnerability or threat
Counter-measure
User who attempts to defeat authentication and gain illicit access to resources
Malicious user
Use of code or procedures in an attack
Exploit
Any data used to prove idenitity
Authentication Information
Process by which use of resources and services is granted or denied
Access Control
Process of tracking users and their actions on the network
Auditing or accounting
a U.S. intelligence agency responsible for providing the US government with encrypted communications (information assurance) and the reading of encrypted communications (signals intelligence) of other nations
National Security Agency (NSA)
An American computer professional, former employee of the Central Intelligence Agency (CIA) and former contractor for the National Security Agency (NSA). In May 2013, he flew from Hawaii to Hong Kong, where he met w/ journalists Glenn Greenwald and Laura Poitras and released numerous documents to them. With his permission, the journalist later revealed his identity to the international media
Edward Joseph Snowden
What did Russian government grant Snowden?
A one-year temporary renewable asylum
a statement that describes what the organization’s practices are
Privacy policy
The information contained in the privacy policies of companies usually follow what?
Fair Information Practices Principles (FIPP) set fourth by the Federal Trade Commission (FTC)