Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/16

Click to flip

16 Cards in this Set

  • Front
  • Back
Access
A subject’s or object’s ability to use, manipulate, modify, or affect another subject or object.
Asset
The organizational resource that is being protected.
Attack
An act that is an intentional or unintentional attempt to cause damage or compromise to the information and/or the systems that support it.
Control, Safeguard or Countermeasure
Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, or otherwise improve the security within an organization.
Exploit
To take advantage of weaknesses or vulnerability in a system.
Exposure
A single instance of being open to damage.
Hack
Good: To use computers or systems for enjoyment. Bad: To illegally gain access to a computer or system.
Object
A passive entity in the information system that receives or contains information.
Risk
The probability that something can happen.
Security Blueprint
The plan for the implementation of new security measures in the organization.
Security Model
A collection of specific security rules that represents the implementation of a security policy
Security Posture or Security Profile
A general label for the combination of all policy, procedures, technology, and programs that make up the total security effort currently in place.
Subject
An active entity that interacts with an information system and causes information to move through the system for a specific end purpose.
Threats
A category of objects, persons, or other entities that represents a potential danger to an asset.
Threat Agent
A specific instance or component of a more general threat.
Vulnerability
Weaknesses or faults in a system or protection mechanism that expose information to attack or damage.