Shared Flashcard Set

Details

Lesson 1/2 - BCM
DC
4
Computer Networking
Graduate
09/13/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
threats
Definition
Objects, persons, or other entities that pose a potential risk of loss to an asset are called
Term

confidentiality, integrity, and availability

Definition
Name the three critical elements of the C.I.A. triangle.
Term
exploit
Definition
A targeted solution to misuse a specific vulnerability is called a(n) ____.
Term
Information Security
Definition
  ____ is the protection of the confidentiality, integrity, and availability of information, whether in storage, during processing, or in transmission. 
Supporting users have an ad free experience!