Term
|
Definition
a potentially negative occurrence |
|
|
Term
|
Definition
seeks to prevent the unauthorized disclosure of information: it keeps data secret |
|
|
Term
|
Definition
seeks to prevent unauthorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. Integrity also seeks to ensure data that is written in an authorized manner is complete and accurate. |
|
|
Term
|
Definition
ensures that information is available when needed |
|
|
Term
|
Definition
An active entity on an information system |
|
|
Term
|
Definition
|
|
Term
Annualized Loss Expectancy |
|
Definition
the cost of loss due to a risk over a year |
|
|
Term
|
Definition
|
|
Term
|
Definition
a matched threat and vulnerability |
|
|
Term
|
Definition
a measure taken to reduce risk |
|
|
Term
|
Definition
|
|
Term
|
Definition
money saved by deploying a safeguard |
|
|
Term
|
Definition
Confidentiality, Integrity, and Availability |
|
|
Term
|
Definition
disclosure, alteration, and destruction - Counterpoint to CIA |
|
|
Term
An example of a confidentiality attack |
|
Definition
Theft of PII such as SSNs or Credit Card info |
|
|
Term
|
Definition
protect information against unauthorized modification |
|
|
Term
An example of attack on availability |
|
Definition
|
|
Term
|
Definition
Authorization, Authentication, Accountability |
|
|
Term
|
Definition
informal- doing what a reasonable person would do. It is sometimes called the “prudent man” rule |
|
|
Term
|
Definition
follows a process - management of due care. |
|
|
Term
|
Definition
|
|