ISYS 350 Information Security

This is for a college level Information Security class.   

64 cards   |   Total Attempts: 182
  

Related Topics

Cards In This Set

Front Back
The control approach used by an organization to acknowledge the risk as being a part of an organization's business process.
Acceptance
The ability to use, manipulate, modify, or affect an object.
Access
Consists of the user access lists, matrices, and capability tables that govern the rights and privileges of users.
Access Control List (ACL)
Security measures such as a badge reader that admits or prohibits people from entering sensitive areas.
Access Controls
One of three general categories of unethical and illegal behavior in which individuals with authorization and privileges to mange information within the organization cause harm or damage inadvertently -- that is, without intent to do harm.
Accident
Authorizes an IT system to process, store, or transmit information.
Accreditation
An attribute of information in which the data is free of errors and has the value that the user expects.
Accuracy
The value an asset gains over time within an organization.
Acquired Value
Devices that scan networks for highly detailed information. An "active" scanner is one that initiates traffic on the network in order to determine security holes.
Active Vulnerability Scanners
Rules designed to prohibit data packets with certain addresses or partial addresses from passing through devices.
Address Restrictions
A Federal Information Processing Standard (FIPS) that specifies a cryptographic algorithm for use within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.
Advanced Encryption Standard (AES)
Any software program intended for marketing purposes such as those used to deliver and display advertising banners or popups to the user's screen or tracking the user's online usage or purchasing activity.
Adware
Sworn testimony that certain facts are in the possession of the investigating officer that they feel warrant the examination of specific items located at a specific place.
Affidavit
A detailed examination of the events that occur from the first detection of a security breach to the final recovery.
After-Action Review (AAR)
Information created by combining pieces of data that are not considered private in themselves, but raise privacy concerns when taken together.
Aggregate Information