Term
|
Definition
The act of protecting information from unauthorized access. It usually includes an in-depth plan on how to secure data, computers, and networks. |
|
|
Term
|
Definition
Preventing the disclosure of information to unauthorized persons. |
|
|
Term
|
Definition
This means that authorization is necessary before data can be modified. |
|
|
Term
|
Definition
Data is obtainable regardless of how information is stored, accessed, or protected. |
|
|
Term
|
Definition
The idea of ensuring that a person or group cannot refute the validity of your proof against them. |
|
|
Term
|
Definition
When a person’s identity is confirmed. Authentication is the verification of a person’s identity. |
|
|
Term
|
Definition
When a user is granted access to specific resources when authentication is complete. |
|
|
Term
|
Definition
The tracking of data, computer usage, and network resources. Often it means logging, auditing, and monitoring of the data and resources. |
|
|
Term
|
Definition
The building up and layering of security measures that protect data from inception, on through storage and network transfer, and lastly to final disposal. |
|
|
Term
|
Definition
an expert at breaking into systems and can attack systems on behalf of the system’s owner and with the owner’s consent. |
|
|