Information Security ch. 5
Risk
probability of a threat exploiting vulnerability
CIA triad
the three main principles of IT security
Risk management
Process of identifying, assessing, and reducing risk to an acceptable level
Exposure
the estimated cost, loss, or damage that can result if a threat exploits a vurnerability
Audit
the process of generating, recording, and reviewing a chronological record of a system events to ascertain their accuracy.
Malware
Spyware
Stealth software that gathers information about a user or a user’s online activity
Threat
Threat is something or someone that may result in harm to an asset.
Vulnerability
weaknesses that threatens the confidentiality, integrity, or availability of an asset.
Zombie
DDOS
: an attack in which a system is bombarded with so many requests
Back up
: a duplicate copy of data programs kept in a secured location.
PKI
a system to identify and authenticate the sender or receiver of an internet message or transaction