Module 1 Flashcards
Overview of Computer Security
Computer
An electronic device that can be programmed to carry out a set of arithmetic or logical operations and may be used for storing and processing data/information. Examples include desktop computers, mobile devices, IoT devices, and industrial controllers.
Data
Raw statistics and facts collected from either analysis or reference. It lacks context and can be stored in an electronic format.
Information
Processed data that offers context and can influence decisions.
Information System
An entire set of data, software, hardware, network, people, procedures, and policies dealing with processing and distributing information in an organization.
Computer Security
Measures and controls ensuring the confidentiality, integrity, and availability of information system assets, including hardware, software, firmware, and information being processed, stored, and communicated.
Confidentiality
Only authorized parties can view private/confidential information.
Integrity
Information is changed only in a specified and authorized manner.
Availability
Information is accessible to authorized users whenever needed.
Data at Rest
Data being stored in memory or on disk.
Data in Transit
Data being transferred between systems, in physical or electronic form.
Data in Use
Data being actively examined or modified, usually decrypted.
Security Threat
Any action/inaction that could cause disclosure, alteration, loss, damage, or unavailability of information assets.
Target
Organization’s assets such as hardware, software, data, and communication lines and networks.
Agent
Entity (people and/or organizations) originating the threat (intentional or unintentional).
Event
Malicious or accidental disclosure/alteration of information, misuse of authorized information, etc.
Vulnerability
Weakness in an information system, security procedure, internal controls, or implementation that could be exploited or triggered by a threat source.
Attack
A threat event deliberately executed by an agent against an asset with vulnerability.
Inside Attack
Initiated by an entity inside the security perimeter with authorized access but uses resources improperly.
Outside Attack
Initiated from outside the perimeter by an unauthorized or illegitimate user of the system.
Active Attack
An attempt to alter system resources or affect their operation, compromising integrity or availability.