Shared Flashcard Set

Details

Principles of Information Security
Chap1 and Chap2 Vocabulary Words and Definitions
34
Computer Science
Graduate
06/13/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Information Security
Definition
a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002)
Term
Goal of Information Security
Definition

maintain the status quo, maintain the security, maintain the liveness

Term
Security
Definition
is “the quality or state of being secure--to be free from danger.” 
Term
Aspects of Security
Definition

 

Physical security – To protect the physical items, objects, or areas of an organization from unauthorized access and misuse.

Personal security – To protect the individual or group of individuals who are authorized to access the organization and its operations.

Operations security – To protect the details of a particular operation or series of activities.

Communications security – To protect an organization’s communications media, technology, and content.

Network security – To protect networking components, connections, and contents.

Term
C.I.A.
Definition
Confidentiality Integrity Availability
Term

Critical Characteristics of Information

Definition

 

Availability – Enables users who need to access information to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format. 

Accuracy – Free from mistake or error and having the value that the end user expects. If information contains a value different from the user’s expectations due to the intentional or unintentional modification of its content, it is no longer accurate.

Authenticity –The quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. 

Confidentiality – The quality or state of preventing disclosure or exposure to unauthorized individuals or systems. 

Integrity – The quality or state of being whole, complete, and uncorrupted.  The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state.

Utility – The quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. This means that if information is available, but not in a format meaningful to the end user, it is not useful.

Possession – The quality or state of having ownership or control of some object or item. Information is said to be in possession if one obtains it, independent of format or other characteristic. While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality.

Term
Components of an Information System
Definition

hardware, software, data, procedures, people- easiest to hardest to change

Term
Systems Development Life Cycle (SDLC):
Definition
a methodology for the design and implementation of an information system in an organization. 
Term
Data Owner
Definition
Responsible for the security and use of a particular set of information.
Term
Data Custodian
Definition
Responsible for the storage, maintenance, and protection of the information.
Term
Data Users
Definition
The end systems users who work with the information to perform their daily jobs supporting the mission of the organization.
Term
Access
Definition
a subject or object’s ability to use, manipulate, modify, or affect another subject or object. 
Term
Asset
Definition
the organizational resource that is being protected.
Term
Attack
Definition
an act that is an intentional or unintentional attempt to cause damage or compromise to the information and/or the systems that support it.
Term
Control, Safeguard, or Countermeasure
Definition
security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization. 
Term
Exploit
Definition
to take advantage of weaknesses or vulnerability in a system. 
Term
Exposure
Definition
a single instance of being open to damage. 
Term
Hack
Definition
Good: to use computers or systems for enjoyment; Bad: to illegally gain access to a computer or system.
Term
Object
Definition
a passive entity in the information system that receives or contains information. 
Term
cracker
Definition
an individual who “cracks” or removes the software protection from an application designed to prevent unauthorized duplication.
Term
Risk
Definition
the probability that something can happen.
Term
Security Blueprint
Definition
the plan for the implementation of new security measures in the organization.
Term
Security Model
Definition
a collection of specific security rules that represents the implementation of a security policy. 
Term
Security Posture or Security Profile
Definition
a general label for the combination of all policies, procedures, technologies, and programs that make up the total security effort currently in place.
Term
Subject
Definition
- an active entity that interacts with an information system and causes information to move through the system for a specific end purpose
Term
Threats
Definition
a category of objects, persons, or other entities that represents a potential danger to an asset.
Term
Threat Agent
Definition
a specific instance or component of a more general threat.
Term
Vulnerability
Definition
weaknesses or faults in a system or protection mechanism that expose information to attack or damage.
Term
Intellectual property
Definition
“the ownership of ideas and control over the tangible or virtual representation of those ideas.”
Term
software piracy
Definition
the unlawful use or duplication of software-based intellectual property
Term
phreaker
Definition
hacks the public telephone network to make free calls, disrupt services, and generally wreak havoc.
Term
Attack
Definition
a deliberate act that exploits vulnerability
Term
Pharming
Definition
redirection of legitimate Web traffic (e.g., browser requests) to illegitimate site for the purpose of obtaining private information
Term
Timing attack
Definition
relatively new; works by exploring contents of a Web browser’s cache to create malicious cookie
Supporting users have an ad free experience!