OVERVIEW OF SECURITY Flashcards
WHAT IS THE CIA TRIAD
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
CONFIDENTIALITY
INFORMATION THAT HAS NOT BEEN DISCLOSED TO UNAUTHORIZED PEOPLE
INTEGRITY
INFORMATION THAT HAS NOT BEEN MODIFIED OR CHANGED WITHOUT PROPER AUTHORIZATION
WHAT IS THE AAA OF SECURITY
AUTHORIZATION
AUTHENTICATION
ACCOUNTING
AUTHORIZATION
WHEN A USER IS GIVEN ACCESS TO A PIECE OF DATA OR CERTAIN AREAS OF A BUILDING
AUTHENTICATION
WHEN A PERSON IS IDENTIFIED BY: SOMETHING YOU KNOW SOMETHING YOU ARE SOMETHING YOU HAVE SOMETHING YOU DO SOMEWHERE YOU ARE
ACCOUNTING
TRACKING OF DATA, COMPUTER USAGE, AND NETWORK RESOURCES
WHAT IS NON-REPUDIATION
WHEN YOU HAVE PROOF THAT SOMEONE AUTHENTICATES SOMETHING
WHAT IS MALWARE
MALICIOUS SOFTWARE
UNATHORIZED ACCESS
WHEN ACCESS TO COMPUTER RESOURCES AND DATA OCCURS WITHOUT THE CONSENT OF THE OWNER
SYSTEM FAILURE
WHEN A COMPUTER CRASHES OR APPLICATION FAILS
SOCIAL ENGINEERING
ACT OF MANIPULATING USERS INTO REVEALING CONFIDENTIAL INFORMATION OR PERFORMING THER DETRIMENTAL ACTS
PHYSICAL CONTROL
ALARM SYSTEMS, LOCKS, CAMERAS, ID, GUARDS
TECHNICAL CONTROLS
SMART CARDS, ENCRYPTION, ACCESS CONTROL LISTS (ACL), INTRUSTION DETECTION SYSTEMS, AND NETWORK AUTHENTICATION
ADMINISTRATIVE CONTROLS
USER TRAINING
POLICIES, PROCEDURES, SECURITY AWARENESS, , CONTINGENCY PLANNING, DISASTER RECOVERY PLANS