• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

What is security

Absence of threats. Capability to deal with existing threats.

What are the interests of the organization

To get, protect, enlarge/increase something valuable

What is information

*"Symbols which have meaning / Logically connected symbols


* Something Valuable / Asset / Resource which is important for the business

Information

Data generated, stored and used in the organization (about goals, processes, products, clients, staff, everything related to its normal and succesful functioning)

What is the goal of information security

* The protection of information resources. These information resources are generated, stored and used by the organization. Sometimes the organization uses information created by other organizations.


* The protection of people working with this information


* The protection of devices related to the creation, storage, dissemination and processing of information

In short

The confidentiality, the integrity and the availability of information to be guaranteed

Which are the basic threats to the information security?

People


Internal and external intruders (hackers, terrorists, spies) who steal information/ lose information/ destroy information resources/ block working processes etc.


They have different motivation.



Which are the basic threats to the information security?

Related to the vulnerabilities of the system/computer system


Vulnerability - weak point of a system

Physical vulnarability

People

Software vulnerability

Different types if malicious software (Trojans, worms, etc)

Vulnerability of emitting/broadcasting

-

Vulnerability of the enviornment

Temperature,Humidity, Dust

Human vulnerability

-