Principle of Information Security part 2 Flashcards
Confidentiality
Integrity
Availability
Are the three underlying principles of data protection.
CIA triad
The condition of being private or secret is known as what in the CIA Triad
Confidentiality
Having important information in the state of being complete or uncorrupted is known as
Integrity
Having access to information when you need it is known as
Availability
This term refers to the weakness of an Asset that can be Exploited by one or more attackers
Vulnerability
Any event that has the potential to bring harm to an organization or individual.
Threat
The potential or loss or damage when a threat exploits a vulnerability
Risk
A computer code intentionally written to cause some form of harm.
Malware
fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
Phishing
a third party trying to gain access to your systems by cracking a user’s password.
Password Attack
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet.
Denial-of-Service Attack DDoS:
a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Ransomware