Download presentation
Presentation is loading. Please wait.
1
Chapter 1 Key Security Terms
2
Are We Blurring the ethical lines?
If so how are we to define our boundaries?
3
Terms Access Asset Attack
A subject or object’s ability to use, manipulate, modify, or affect another subject or object. Asset Organizational resource being protected. Attack The act of intentional attempt to cause damage or to otherwise compromise the information and or system.
4
Terms Control, Safeguard or Countermeasure Exploit Exposure
These terms represent security mechanisms. Exploit 1) Hacker may attack a given system. 2) A targeted solution to misuse a specific hole. Exposure A single instance when the system is open to damage under or in an attack.
5
Terms Hacking Object Risk To write computer programs for enjoyment
To gain access to a computer illegally (Cracker) Object A passive entity in the information system that receives or contains information. Risk The probability that something can happen.
6
Terms Security Model Security Posture Subject
Is a collection of specific security rules that represents the implementation of security policy. Security Posture Refers to the implementation of security in an organization. Subject An active entity that interacts with an information system and causes information to move through the system for a specific purpose.
7
Terms Threats Threat Agent Vulnerability
A category of objects, persons, or other entities that represent a potential danger to an asset. Threat Agent The specific instance or component of a threat. Vulnerability Weakness or faults in a system or protection mechanism that exposes information to attack or damage.
9
/DEV/NULL
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.