A+ GRADED. Buy Quality Materials!
Signals intelligence
The collection, analysis, and distribution of information from foreign communications
networks for intelligence and counterintelligence purposes and in support of military
operations.
Cultural Mores
fixed moral attitudes or customs of a particular group
Ethics
The branch of philosophy that considers nature, criteria, sources, logic, and the validity
of moral judgment.
Laws
Rules that mandate or prohibit certain behavior and are enforced by the state.
due care
Measures that an organization takes to ensure every employee knows what is
acceptable and what is not.
due diligence
reasonable steps taken by people or organizations to meet the obligations imposed by
laws or regulations
jurisdiction
the power to make legal decisions
liability
an entity's legal obligation or responsibility
long-arm jurisdiction
The ability of a legal entity to exercise its influence beyond its normal boundaries by
asserting a connection between an out-of-jurisdiction entity and a local legal case.
restitution
A legal requirement to make compensation or payment resulting from a loss or injury.
policy
Guidelines that dictate certain behavior within the organization.
aggregate information
Collective data that relates to a group or category of people and that has been altered to
remove characteristics or components that make it possible to identify individuals within
the group.
information aggregation
Pieces of nonprivate data that, when combined, may create information that violates
privacy.
privacy
In the context of information security, the right of individuals or groups to protect
themselves and their information from unauthorized access, providing confidentiality.
Identity theft
The unauthorized taking of personally identifiable information with the intent of
committing fraud and abuse of a person ' s financial and personal reputation,
, purchasing goods and services without authorization, and generally impersonating the
victim for illegal or unethical purposes.
Information assurance
The affirmation or guarantee of the confidentiality, integrity, and availability of
information in storage, processing, and transmission.
CIA Triad
The industry standard for computer security since the development of the mainframe.
The standard is based on three characteristics that describe the utility of information:
confidentiality, integrity, and availability.
Communications security
The protection of all communications media, technology, and content
Information security
Protection of the confidentiality, integrity, and availability of information assets, whether
in storage, processing, or transmission, via the application of policy, education, training
and awareness, and technology.
Network security
A subset of communications security; the protection of voice and data networking
components, connections, and content.
Security
A state of being secure and free from danger or harm. Also, the actions to make
someone or something secure.
Accuracy
An attribute of information that describes how data is free of errors and has the value
that the user expects.
Authenticity
An attribute of information that describes how data is genuine or original rather than
reproduced or fabricated.
Availability
An attribute of information that describes how data is accessible and correctly formatted
for use without interference or obstruction.
Confidentiality
An attribute of information that describes how data is protected from disclosure or
exposure to unauthorised individuals or systems.
Integrity
An attribute of information that describes how data is whole, complete and uncorrupted.
Personally Identifiable Information (PII)
A set of information that could uniquely identify an individual.
Possession
an attribute of information that describes how the data's ownership or control is
legitimate or authorized.
Utility
An attribute of information that describes how data has value or usefulness for an end
purpose.
McCumber Cube
A graphical representation of the architectural approach widely used in computer and
information security.