Module 1 Flashcards
Confidentiality
Relates to permitting authorized access to information, while at the same time protecting information from improper disclosure.
Integrity
Integrity is the property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.
Availability
Availability means that systems and data are accessible at the time users need them.
Personally Identifiable information ( PII)
1) any information that can be used to distinguish or trace an idividual’s identity, such as a name, Social Security Number, date and place of birth , mother’s maiden name, or biometric records;
2) any other information that is linked or linkable to an individual, such as medical, educational, financial and employment information.
Protected Health Information
Information regarding health status, the provision of healthcare or payment for healthcare as defined in HIPPA ( Health Insurance Portability and Accountability Act).
Classified or sensitive information
Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and classification level when in documentary form.
Sensitivity
A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.
Data Integrity
The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing and while in transit.
System Integrity
The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system , whether intentional or accidental.
State
The condition an entity is in at a point in time.
A baseline
A documented, lowest level of security configuration allowed by a standard or organization.
Criticality
A measure of the degree to which an organization depends on the information or information system for the success of a mission or of business function.
Authentication
Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one( single-factor or SFA) or more ( multi-factor authentication or MFA) factors of identification.
Token
A physical object a user possesses and controls that is used to authenticate the user’s identity.
Biometrics
Biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns.