The flashcards below were created by user
Characteristic of information that exists when every activity involving the information can be attributed to a named person or automated process.
Validation that the claimed identity of supplicant is indeed the person or entity requesting authorized access to a system or facility.
"Permission granted to properly identified and validated supplicant by an authority to access
A quality or state of information characterized by being accessible and correctly formatted for use without interference or obstruction.
"The industry standard for computer security since the development of the mainframe. It is based on three characteristics that describe the utility of information: confidentiality
"The protection of an organizations communications media
Community of interest
A group of individuals united by shared interests or values within an organization.
The quality or state of information that prevents disclosure or exposure to unauthorized individuals or systems.
Control Synonymous with safeguard
" A security mechanism
Critical path method (CPM)
A networking dependency project diagramming technique similar to PERT.
"Management role that involves selecting from among alternative approaches
General business community
A group of nontechnical business managers and professionals within an organization.
The ability of an information system to recognize individual users.
" A management role that seeks to collect
Information security (InfoSec)
" The protection of information and the systems and hardware that use
Information security community
Those members of an organization who are assigned to protect the information and the systems that process it.
Information technology community
Those technology professionals that support the business objectives of the organization by supplying and supporting information technology.
" The quality or state of being whole
" A management role that includes interacting with superiors
A management role that addresses the direction and motivation of human resources.
The process of achieving objectives using a given set of resources.
A member of an organization who coordinates the work of employees order to accomplish organizational goals.
"The protection of an organizations data networking devices
The safeguarding of the organizations ability to fulfill operational activities without interruption or compromise.
" The management principle dedicated to the structuring of resources to support the accomplishment of objectives. Also
"An aspect of information security that addresses the design
"The process that develops
The set of organizational guidelines that describe acceptable and unacceptable behaviors of employees in the workplace.
Program Evaluation and Review Technique (PERT)
PERT was developed in the late 1950s to meet the needs of the rapidly expanding engineering projects associated with government acquisitions such as weapons systems.
The phenomenon of becoming so engrossed in project administration that meaningful project work is neglected.
"The application of knowledge
Projects are discrete sequences of activities with starting points and defined completion points.
A project phenomenon that occurs when the quantity or quality of project deliverables is expanded from the original project plan.
"To be protected from the threat of loss; protection from that which would do harm
The difference in time between the critical path and any other path. It identifies how much time is available for starting a non-critical task without delaying the project as a whole.
Work Breakdown Structure
A planning approach that breaks a project plan into specific action steps.
BAKER ITS305 Information Security Chapter one key words