Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 1 Security

TermDefinition
Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information
Integrity Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity
Availability Ensuring timely and reliable access to and use of information
Low Impact The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals
Moderate Impact The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals
High Impact The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals
Adversary (threat agent) Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Attack Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Countermeasure A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity,
Risk A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Security Policy A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to maintain a condition of security for systems and data.
System Resource (Asset) A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems
Threat Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations
Vulnerability Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Corrupted Vulnerability Loss of integrity
Leaky Vulnerability Loss of confidentiality
Unavaliable or very slow vulnerability Loss of availability
Passive Attack attempt to learn or make use of information from the system that does not affect system resources
Active Attack attempt to alter system resources or affect their operation
Insider Attack initiated by an entity inside the security parameter
Outsider Attack Initiated from outside the perimeter
Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized.
Exposure Sensitive data are directly released to an unauthorized entity
Interception An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
Interference A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or by-products of communications.
Intrusion An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.
Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true
Masquerade An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity
Falsification False data deceive an authorized entity.
Repudiation An entity deceives another by falsely denying responsibility for an act.
Disruption A circumstance or event that interrupts or prevents the correct operation of system services and functions.
Incapacitation Prevents or interrupts system operation by disabling a system component.
Corruption Undesirably alters system operation by adversely modifying system functions or data
Obstruction A threat action that interrupts delivery of system services by hindering system operation
Usurpation A circumstance or event that results in control of system services or functions by an unauthorized entity
Misappropriation An entity assumes unauthorized logical or physical control of a system resource
Misuse Causes a system component to perform a function or service that is detrimental to system security
Attack Surfaces Consist of the reachable and exploitable vulnerabilities in a system
Network Attack Surface Vulnerabilities over an enterprise network, wide-area network, or the Internet
Software Attack Surface Vulnerabilities in application, utility, or operating system code
Human Attack Surface Vulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insiders
Security Policy Formal statement of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
Security Implementation Prevention, Detection, Response, Recovery
Assurance Encompassing both system design and system implementation, assurance is an attribute of an information system that provides grounds for having confidence that the system operates such that the system’s security policy is enforced
Evaluation Process of examining a computer product or system with respect to certain criteria. Involves testing and may also involve formal analytic or mathematical techniques
Standards Standards have been developed to cover management practices and the overall architecture of security mechanisms and services
National Institute of Standards and Technology(NIST) NIST is a U.S. federal agency that deals with measurement science, standards, and technology related to U.S. government use and to the promotion of U.S. private sector innovation
Internet Society (ISOC) ISOC is a professional membership society that provides leadership in addressing issues that confront the future of the Internet, and is the organization home for the groups responsible for Internet infrastructure standards
International Telecommunication Union (ITU-T) ITU is a United Nations agency in which governments and the private sector coordinate global telecom networks and services
International Organization for Standardization (ISO) ISO is a nongovernmental organization whose work results in international agreements that are published as International Standards
Created by: SiennaRad
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards