Term
|
Definition
| Attackers use thousands of computers in an attack against a single computer or network |
|
|
Term
|
Definition
| Guarding digitally-formatted information |
|
|
Term
|
Definition
| Only approved individuals may access information |
|
|
Term
|
Definition
| Information is correct and unaltered |
|
|
Term
|
Definition
| Information is accessible to authorized users |
|
|
Term
|
Definition
| Plans and Policies established by an organization to ensure that people correctly use the products |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Actions or events that have potential to cause harm |
|
|
Term
|
Definition
| Person or element with power to carry out a threat |
|
|
Term
|
Definition
Flaw or weakness Threat agent can bypass security |
|
|
Term
|
Definition
Likelihood that threat agent will exploit vulnerability Cannot be eliminated entirely Cost would be too high Take too long to implement Some degree of risk must be assumed |
|
|
Term
|
Definition
|
|
Term
|
Definition
Premeditated, politically motivated attacks Target: information, computer systems, data Designed to: Cause panic Provoke violence Result in financial catastrophe
A premeditated politically motivated attack against information , computer systems, computer programs, and data that results in violence |
|
|
Term
|
Definition
| Person hired to break into a computer to steal information |
|
|
Term
|
Definition
Ideological motivation Attacking because of their principles and beliefs |
|
|