Principles 1 Flashcards
-a well-informed sense of assurance that the information risks and controls are in balance.
-protection of both data and physical assets.
information security
-must review the origins of this field to understanding of information security today.
security professionals
-the quality or state of being secure- to be free from danger.
-a successful organization should have multiple layrs of security in place
security
-the protection of physical items objects or areas from unauthorized access and misuse.
physical security
-a risk management process that encourage managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands
operations security
the protection of voice and data networking components connections and content.
communication security
-was standard based on confidentiality, integrity, and availability.
-now expanded into list of critical characteristics of information.
C.I.A triangle
(key information security concepts)
-a subject or object’s ability to use manipulate, modify or affect another subject or object
access
(key information security concepts)
-the organizational resource that is being protected
asset
(key information security concepts)
-an intentional and unintentional act that can damage or otherwise compromise information in the systems that support it.
attack
(key information security concepts)
-these are security mechanisms policies or procedures that can successfully counter attack reduce risk resolve vulnerabilities and otherwise imrpove securiity within an organization
control, safeguard or countermeasure
(key information security concepts)
-a technique used to compromise the system
exploit
(key information security concepts)
-a condition or state of being exposed,
exposure
(key information security concepts)
-a single instance of information asset suffering damage or destruction unintended or unauthorized modification or disclosure or denial of use.
loss
(key information security concepts)
the entire set of controls and safeguards including policy education training and awareness and technology that the organization implements to protect the asset.
protection profile or security posture