Created by cuse0528
over 8 years ago
|
||
3 Main Goals of Security
This is the means for preventing users from gaining unauthorized access
This is the way the user is discovered attempting to access unauthorized data or after information has been lost.
This is the process in which vital data is retrieved from a crashed system, storage devices or physical resources.
This is a concept that indicates exposure to the chance of damage or loss. Also signifies the likelihood of a hazard or dangerous threat occurring.
This is any event or action that could potentially cause damage to an asset.
Types of threats include...
This is any condition that leaves the system open to harm. (Weakness in the network)
Types of vulnerabilities include...
This occurs when an attacker accesses a computer system without authorization.
3 types of intrusions are...
This is a technique used to exploit a vulnerability in an application or physical computer system.
Types of attacks include...
These are countermeasures you need to put in place to avoid, mitigate and counteract security risks due to threats or attacks.
Types of controls include...
This security management process consists of detecting problems and determining how best to protect the system.
This security management process consists of installing control mechanisms to prevent problems in the system.
This security management process consists of detecting and solving any security issues after security controls have been implemented.
The CIA Triad consists of...
This is the principle of keeping info and communication private and protecting it from unauthorized people.
This is the principle of keeping an organization's information accurate, free of errors, and without unauthorized modifications.
This is ensuring systems operate continuously and authorized persons can access the data they need.
The goal of ensuring the party that sent a transmission or created the data remain associated with that data and cannot deny sending or creating that data is known as?
The method that ensures that the entity requesting access to resources by using a certain set of credentials is the owner of the credentials is known as?
The method of validating a particular entity or individual's unique credentials is known as?