Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
What is security |
Absence of threats. Capability to deal with existing threats. |
|
What are the interests of the organization |
To get, protect, enlarge/increase something valuable |
|
What is information |
*"Symbols which have meaning / Logically connected symbols * Something Valuable / Asset / Resource which is important for the business |
|
Information |
Data generated, stored and used in the organization (about goals, processes, products, clients, staff, everything related to its normal and succesful functioning) |
|
What is the goal of information security |
* The protection of information resources. These information resources are generated, stored and used by the organization. Sometimes the organization uses information created by other organizations. * The protection of people working with this information * The protection of devices related to the creation, storage, dissemination and processing of information |
|
In short |
The confidentiality, the integrity and the availability of information to be guaranteed |
|
Which are the basic threats to the information security? |
People Internal and external intruders (hackers, terrorists, spies) who steal information/ lose information/ destroy information resources/ block working processes etc. They have different motivation. |
|
Which are the basic threats to the information security? |
Related to the vulnerabilities of the system/computer system Vulnerability - weak point of a system |
|
Physical vulnarability |
People |
|
Software vulnerability |
Different types if malicious software (Trojans, worms, etc) |
|
Vulnerability of emitting/broadcasting |
- |
|
Vulnerability of the enviornment |
Temperature,Humidity, Dust |
|
Human vulnerability |
- |
|
|
|