lesson one January 11
Terms in this set (21)
is a key concept when thinking about physical security.
Systems, networks, and application, this is another idea that has been around for quite some time.
is the third core security principle, and it describes a resource being accessible to a user, application or computer system when required.
Concept we deal with frequently in real life.
defense in depth
means using multiple layers of security to defend your assets.
Portable storage device on the computer.
is defined as the consistency accuracy, and validity of data or information.
physical or logical device used to capture keystokes.
one of the largest challenges facing many security professionals today.
principle of least privilege
security discipline that requires that a particular user system or application be given no more privilege than necessary to perform its function or job.
Drive is a storage device that is design to be taken out of a computer without turning the computer off.
Risk that remains after measures have been taken to reduce the likelihood or minimized the effect of a particular event.
generally defined as a probability that an event will occur.
is the act of identifying and then making an informed decision to accept the likelihood and impact of specific risk.
to identify the risk that might impact your particular environments.
the process of eliminating a risk by choosing not to engage in an action or activity.
is the process of identifying, assessing,and prioritizing threats and risk.
consists of taking steps to reduce the likelihood or impact of risk.
is the act of taking steps to move responsibility for a risk to third part through insurance or outsourcing.
is a method used to gain access to data, system or networks primarily through misrepresentation.
an action or occurrence that could result in the breach, outage, or corruption of an system by exploiting known or unknown vulnerabilities.