Midterm Prep Flashcards
Weakness in an information system that could be exploited or triggered by a threat source.
Vulnerablility
A circumstance or event or event that results in control of system services or functions by an unauthorized entity.
usurpation
An event involving the exposure of information to entities not authorized access to the information
Unauthorized disclosure
Inference of information from observable characteristics of data flow, even when the data is encrypted or otherwise not directly available.
Traffic analysis
Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
system integrity
A database that provides data of a statistical nature, such as counts and averages.
statistical database
A service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
security service
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.
security policy
A mechanism that is designed to detect, prevent, or recover from a security attack.
security mechanism
Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
role-based access control
An exception of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.
risk
Denial by one of the entities involved in a communication of having participated in all or part of the communication.
repudiation
An attack in which a service already authorized and completed is forged by another, duplicate request in an attempt to repeat authorized commands.
replay
Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
privacy
An attempt to learn or make use of information from the system that does not affect system resources.
passive attack
An attack initiated by an entity outside the security perimeter (an “outsider”)
outside attack
A management-oriented security standard that focuses on the OSI model and on networking and communications aspects of security.
OSI security architecture
Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the senders identity, so neither can later deny having processed the information.
non-repudiation
A major application, general support system, high impact program, physical plant, mission critical system, or a logically related group of systems.
asset
The degree of confidence one has that the security measures, both technical and operational, work as intended to protect the system and the information it processes.
assurance
A threat that is carried out and if successful, leads to an undesirable violation of security
attack
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
authentication
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
Authenticity
The property of a system or a system or a system resource being accessible and usable upon demand by and authorized system entity.
availability
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
confidentiality
An attack on system on system integrity. Malicious software in this context could operate in such a way that system resources or services function in an unintended manner. Or a user could gain unauthorized access to a system and modify some of its functions
corruption
Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of information system.
countermeasure
The property that information is not made available or disclosed to unauthorized individuals, entities, or processes
Data confidentiality
The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner.
data integrity
The prevention of authorized access to resources or the delaying of time-critical operations.
denial of service.
A threat to availability or system integrity
disruption