Term
|
Definition
| Ability to use, modify, or affect another object |
|
|
Term
|
Definition
| Organizational resource being protected |
|
|
Term
|
Definition
| Act that causes damage to information or systems |
|
|
Term
| Control, Safeguard or Countermeasure |
|
Definition
| Secutiry mechanisms, policies, or procedures |
|
|
Term
|
Definition
| Techquine used to compromise a system |
|
|
Term
|
Definition
| Condition or state of being exposed to attack |
|
|
Term
|
Definition
Works of the mind
Inventions, literature, art, logos, and other createive works |
|
|
Term
|
Definition
| Single instance of damage to an information asset |
|
|
Term
| Protection profile or security posture |
|
Definition
| Set of controles that protect an asset |
|
|
Term
|
Definition
| Probability that something unwanted will happen |
|
|
Term
|
Definition
| Agent used to conduct the attack |
|
|
Term
|
Definition
| Target entity of an attack |
|
|
Term
|
Definition
| Entity presenting danger to an asset |
|
|
Term
|
Definition
| Specific instance of a threat |
|
|
Term
|
Definition
| Weakness of fault in a system |
|
|
Term
|
Definition
| Ability to access information without obstruction |
|
|
Term
|
Definition
| Information is free from errors |
|
|
Term
|
Definition
| Quality of state of being genuine |
|
|
Term
|
Definition
| Protection from disclosure to unauthorized individuals or systems |
|
|
Term
|
Definition
| Responsible for the security and use of a particular set of information |
|
|
Term
|
Definition
| Responsible for information storage, maintenance, and protections |
|
|
Term
|
Definition
| End users who work with information |
|
|
Term
|
Definition
| Information remais whole, complete, uncorrupted |
|
|
Term
|
Definition
| Information has value for some purpose or end |
|
|
Term
|
Definition
| Ownership or control of some object or item |
|
|
Term
|
Definition
| Information is used in accordance with legal requirements |
|
|
Term
| Information Security Model |
|
Definition
| Maps security goals to concrete ideas |
|
|
Term
|
Definition
| Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
| 27 cells represent areas to address to secure information systems |
|
|
Term
|
Definition
| Individual who "cracks" (removes) software protection |
|
|
Term
|
Definition
| Hacks systems to conduct terrorist activities |
|
|
Term
|
Definition
| Gain access without authorization |
|
|
Term
| Hacktivist or Cyberactivist |
|
Definition
| Disrupts or interferes with operations to protest against an organization or government agency |
|
|
Term
|
Definition
| Technique used to gain unauthorized access to computers |
|
|
Term
|
Definition
| Program or device monitoring data traveling over a network |
|
|
Term
|
Definition
| Process of using social skills to convince people to reveal access credentials |
|
|
Term
|
Definition
| Application Error. Occurs when more data is sent to a buffer than it can handle. |
|
|