It is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security
CIA means?
Confidentiality, Integrity and Availability
The purpose of these terms is to describe security using relevant and meaningful words that make security more understandable to management and users, and define its purpose.
CIA Triad
Ensuring that information is only accessible to those authorized to view it.
Confidentiality
Maintaining the accuracy and reliability of data, ensuring it is not altered or tampered with.
Integrity
Ensuring that information and resources are accessible to authorized users when needed.
Availability
It is a term related to the area of confidentiality. It pertains to any data about an individual that could be used to identify them.
Personally Identifiable Information (PII)
is a measure of the importance assigned to information by its owner, or the purpose of denoting its need for protection.
Sensitivity
The process of verifying or proving the user’s identification is known as ‘’_______”.
It is a process to prove the identity of the requestor.
Authentication
is a crucial principle in information security that ensures that a party in a transaction cannot deny the authenticity of their signature on a document or the sending of a message itself.
Non-repudiation
is a legal term and is defined as the protection against an individual falsely denying having performed a particular action.
Non-repudiation
is the right of an individual to control the distribution of information about themselves.
Privacy
is a measure of the extent to which an entity is threatened by a potential circumstance or event. It is often expressed as a combination of:
The adverse impacts that would arise if the circumstance or event occurs; and
The likelihood of occurrence.
Risk
It is something in need of protection.
Asset
is a gap or weakness in those protection efforts.
vulnerability
is an inherent weakness or flaw in a system or component, which, if triggered or acted upon, could cause a risk event to occur.
Vulnerability
is something or someone that aims to exploit a vulnerability to thwart protection efforts.
Threat
is the magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.
Impact
It includes trade secrets, research, business plans and intellectual property
Classified or sensitive information
is information that if improperly disclosed (confidentiality) or modified (integrity) would harm an organization or individual.
Sensitive Information
Measured the degree to which something is whole and complete, internally consistent and correct.
Integrity
It is the assurance that data has not been altered in an unauthorized manner.
Data Integrity
It requires the protection of the data in systems and during processing to ensure that it is free from improper modification, errors or loss of information and is recorded, used and maintained in a way that ensures its completeness.
Data Integrity
As part of data integrity, requires that all instances of the data be identical in form, content and meaning.
Consistency