Term
|
Definition
Attackers use thousands of computers in an attack against a single computer or network |
|
|
Term
|
Definition
Guarding digitally-formatted information |
|
|
Term
|
Definition
Only approved individuals may access information |
|
|
Term
|
Definition
Information is correct and unaltered |
|
|
Term
|
Definition
Information is accessible to authorized users |
|
|
Term
|
Definition
Plans and Policies established by an organization to ensure that people correctly use the products |
|
|
Term
|
Definition
|
|
Term
|
Definition
Actions or events that have potential to cause harm |
|
|
Term
|
Definition
Person or element with power to carry out a threat |
|
|
Term
|
Definition
Flaw or weakness Threat agent can bypass security |
|
|
Term
|
Definition
Likelihood that threat agent will exploit vulnerability Cannot be eliminated entirely Cost would be too high Take too long to implement Some degree of risk must be assumed |
|
|
Term
|
Definition
|
|
Term
|
Definition
Premeditated, politically motivated attacks Target: information, computer systems, data Designed to: Cause panic Provoke violence Result in financial catastrophe
A premeditated politically motivated attack against information , computer systems, computer programs, and data that results in violence |
|
|
Term
|
Definition
Person hired to break into a computer to steal information |
|
|
Term
|
Definition
Ideological motivation Attacking because of their principles and beliefs |
|
|