Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
goals an organization strives to achieve through its security efforts.
3 Primary Security Objectives
the protection against unauthorized access, while providing authorized users access to resources without obstruction. Ensures that data is not intentionally or unintentionally disclosed to anyone without a valid need to know
the protection against unauthorized changes, while allowing for authorized changes performed by authorized users. Ensures that data reamin consistent, both internally and externally. Integrity also protects against accidents and hacker modification by malicious code.
is the protection against downtime, loss of data, and blocked access, while providing consistent uptime, protecting data, and supporting authorized access to resources. Ensures that users can get their work done in a timely manner with access to the proper resources
the proof or verification of a user's identity before granting access to a secured area
controlling what users are allowed and not allowed to do. also known as access control
Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
the security service that prevents a user from being able to deny having performed an action. For example, it prevents a sender from denying having sent a message. Services provided by Auditing and Public-Key Cyrptography
protects the confidentiality, integrity, and availability of personally identifiable or sensitive data. Privacy prevents unauthorized watching and monitoring of users and employees
anything used to conduct business over a computer network
7 Domains of a Typical IT Infrastructure
- User Domain
- Workstation Domain
- LAN Domain
- LAN-to-WAN Domain
- WAN Domain
- System/Application Domain
- Remote Access Domain
What would you like to do?
Home > Flashcards > Print Preview