SAD- Quiz 12 dropdown
Terms in this set (9)
An internal or external entity that could endanger an asset.
Uses analytical techniques to identify potential quality and performance improvements in an information system.
A hostile act that targets the system or the company itself.
An asymmetric kind of encryption.
public key encryption
A process for controlling changes in system requirements during software development.
CM, In risk control, this reduces the impact of a risk by careful planning and preparation. → mitigation
Protects the system and keeps it safe, free from danger, and reliable.
Uses a single key to encrypt and decrypt information.
private key encryptio
Triangle that shows the three main elements of system security.
In risk control, this shifts the risk to another asset or party.