A+ GRADED. Buy Quality Materials!
Individuals must be identifiable and must be held responsible for their actions by
tracking their activities
Accountability
Anything within an environment that should be protected and labelled for the
proposed of risk management and analysis
Asset
A dollar value assigned to an asset based on actual cost and non monetary
expenses
Asset Valuation
Any intentional attempt to exploit a vulnerability of an organization's security
infra structure to cause damage, loss, or disclosure of assets
Attack
The process of confirming the truth of an attribute of a datum or entity
Authentication
The process of verifying that a particular identity are permitted to do in a system
Authorization
The information must be available to authorized entity
Availability
Sending of unsolicited messages over Bluetooth to Bluetooth enabled devices
such as mobile phones, PDAs or laptop computers, sending a vCard which
typically contains a message in the name Iield (i.e. for bluedating or bluechat) to
another bluetooth enabled device via the OBEX protocol.
Bluejacking
Computer Forensics and Investigation is a branch of forensic science pertaining
to legal evidence found in computers and digital storage mediums. Computer
forensics is also known as digital forensics. The goal of computer forensics is to
explain the current state of a digital artifact
Computer Forensics
Preventing the disclosure of information to unauthorized individuals or systems
Confidentiality
The practice and study of hiding information
Cryptography
Someone who is responsible for the tasks of implementing the prescribed
protection deIined by the security policy and upper management
Data Custodian
An instance of an asset loss dur to a threat
Exposure
A trap set to detect, deIlect, or in some manner counteract attempts at
unauthorized use of information systems
Honeypot