Term
|
Definition
Ability to use, modify, or affect another object |
|
|
Term
|
Definition
Organizational resource being protected |
|
|
Term
|
Definition
Act that causes damage to information or systems |
|
|
Term
Control, Safeguard or Countermeasure |
|
Definition
Secutiry mechanisms, policies, or procedures |
|
|
Term
|
Definition
Techquine used to compromise a system |
|
|
Term
|
Definition
Condition or state of being exposed to attack |
|
|
Term
|
Definition
Works of the mind
Inventions, literature, art, logos, and other createive works |
|
|
Term
|
Definition
Single instance of damage to an information asset |
|
|
Term
Protection profile or security posture |
|
Definition
Set of controles that protect an asset |
|
|
Term
|
Definition
Probability that something unwanted will happen |
|
|
Term
|
Definition
Agent used to conduct the attack |
|
|
Term
|
Definition
Target entity of an attack |
|
|
Term
|
Definition
Entity presenting danger to an asset |
|
|
Term
|
Definition
Specific instance of a threat |
|
|
Term
|
Definition
Weakness of fault in a system |
|
|
Term
|
Definition
Ability to access information without obstruction |
|
|
Term
|
Definition
Information is free from errors |
|
|
Term
|
Definition
Quality of state of being genuine |
|
|
Term
|
Definition
Protection from disclosure to unauthorized individuals or systems |
|
|
Term
|
Definition
Responsible for the security and use of a particular set of information |
|
|
Term
|
Definition
Responsible for information storage, maintenance, and protections |
|
|
Term
|
Definition
End users who work with information |
|
|
Term
|
Definition
Information remais whole, complete, uncorrupted |
|
|
Term
|
Definition
Information has value for some purpose or end |
|
|
Term
|
Definition
Ownership or control of some object or item |
|
|
Term
|
Definition
Information is used in accordance with legal requirements |
|
|
Term
Information Security Model |
|
Definition
Maps security goals to concrete ideas |
|
|
Term
|
Definition
Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
27 cells represent areas to address to secure information systems |
|
|
Term
|
Definition
Individual who "cracks" (removes) software protection |
|
|
Term
|
Definition
Hacks systems to conduct terrorist activities |
|
|
Term
|
Definition
Gain access without authorization |
|
|
Term
Hacktivist or Cyberactivist |
|
Definition
Disrupts or interferes with operations to protest against an organization or government agency |
|
|
Term
|
Definition
Technique used to gain unauthorized access to computers |
|
|
Term
|
Definition
Program or device monitoring data traveling over a network |
|
|
Term
|
Definition
Process of using social skills to convince people to reveal access credentials |
|
|
Term
|
Definition
Application Error. Occurs when more data is sent to a buffer than it can handle. |
|
|