Overview of Security Flashcards
The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.
Information Security
The act of protecting the systems that hold and process our critical data
Information System Security
The CIA Triad
Confidentiality
Integrity
Availability
Information that has not been disclosed to unauthorized people
Confidentiality
Information has not been modified or altered without proper authorization
Integrity
Information is able to be stored, accessed, or protected at all times
Availability
AAA of Security
Authentication
Authorization
Accounting
When a person’s identity is established with proof and confirmed by a system
Authentication
The different kinds of authentication
Something you know
Something you are
Something you have
Something you do
Somewhere you are
Occurs when a user is given a certain piece of data or certain areas of a building
Authorization
Tracking of data, computer usage, and network resources
Accounting
Occurs when you have proof that someone has taken an action
Non-repudiation
Security threats
Malware
Unauthorized access
System failure
Social engineering
Short-hand term for malicious software
Malware
Occurs when access to computer resources and data occurs without the consent of the owners
Unauthorized Access