Shared Flashcard Set

Details

Fundamentals
Basic concepts for IT Security
37
Computer Science
Post-Graduate
01/29/2024

Additional Computer Science Flashcards

 


 

Cards

Term
Access
Definition
Ability to use, modify, or affect another object
Term
Asset
Definition
Organizational resource being protected
Term
Attack
Definition
Act that causes damage to information or systems
Term
Control, Safeguard or Countermeasure
Definition
Secutiry mechanisms, policies, or procedures
Term
Exploit
Definition
Techquine used to compromise a system
Term
Exposure
Definition
Condition or state of being exposed to attack
Term
Intellectual Property
Definition

Works of the mind

Inventions, literature, art, logos, and other createive works

Term
Loss
Definition
Single instance of damage to an information asset
Term
Protection profile or security posture
Definition
Set of controles that protect an asset
Term
Risk
Definition
Probability that something unwanted will happen
Term
Subject
Definition
Agent used to conduct the attack
Term
Object
Definition
Target entity of an attack
Term
Threat
Definition
Entity presenting danger to an asset
Term
Threat agent
Definition
Specific instance of a threat
Term
Vulnerability
Definition
Weakness of fault in a system
Term
Availability
Definition
Ability to access information without obstruction
Term
Accuracy
Definition
Information is free from errors
Term
Authenticity
Definition
Quality of state of being genuine
Term
Confidentiality
Definition
Protection from disclosure to unauthorized individuals or systems
Term
Data owners
Definition
Responsible for the security and use of a particular set of information
Term
Data custodians
Definition
Responsible for information storage, maintenance, and protections
Term
Data users
Definition
End users who work with information
Term
Integrity
Definition
Information remais whole, complete, uncorrupted
Term
Utility
Definition
Information has value for some purpose or end
Term
Possession
Definition
Ownership or control of some object or item
Term
Privacy
Definition
Information is used in accordance with legal requirements
Term
Information Security Model
Definition
Maps security goals to concrete ideas
Term
C.I.A Triad
Definition
Confidentiality, Integrity, Availability
Term
McCumber Cube
Definition
27 cells represent areas to address to secure information systems
Term
Cracker
Definition
Individual who "cracks" (removes) software protection
Term
Cyberterrorist
Definition
Hacks systems to conduct terrorist activities
Term
Hackers
Definition
Gain access without authorization
Term
Hacktivist or Cyberactivist
Definition
Disrupts or interferes with operations to protest against an organization or government agency
Term
Spoofing
Definition
Technique used to gain unauthorized access to computers
Term
Sniffers
Definition
Program or device monitoring data traveling over a network
Term
Social Engineering
Definition
Process of using social skills to convince people to reveal access credentials
Term
Buffer Overflow
Definition
Application Error. Occurs when more data is sent to a buffer than it can handle.
Supporting users have an ad free experience!