AND ANSWERS WITH COMPLETE SOLUTIONS GRADED
A++ LATEST UPDATE
Access
ability and means to communicate with or otherwise interact with a system in order to
use system
resources.
Access Control
Protection of system resources against unauthorized access; a process by which use of
system resources
is regulated according to a security policy and is permitted by only authorized entities
(users, programs,
processes, or other systems) according to that policy
Accountability
Property of a system (including all of its system resources) that ensures that the actions
of a system entity
may be traced uniquely to that entity, which can be held responsible for its actions
Application
Software program that performs specific functions initiated by a user command or a
process event and
,that can be executed without access to system control, monitoring, or administrative
privileges
Area
Subset of a site's physical, geographic, or logical group of assets.
Asset
Physical or logical object owned by or under the custodial duties of an organization,
having either a
perceived or actual value to the organization.
Association
Cooperative relationship between system entities, usually for the purpose of transferring
information
between them
Assurance
Attribute of a system that provides grounds for having confidence that the system
operates such that the
system security policy is enforced.
Attack
Assault on a system that derives from an intelligent threat — i.e., an intelligent act that
is a deliberate
attempt (especially in the sense of a method or technique) to evade security services
and violate the
security policy of a system
Attack tree
, Formal, methodical way of finding ways to attack the security of a system.
Audit
Independent review and examination of records and activities to assess the adequacy
of system controls, to ensure compliance with established policies and operational
procedures, and to recommend necessary changes in controls, policies, or procedures
Authenticate
Verify the identity of a user, user device, or other entity, or the integrity of data stored,
transmitted, or otherwise exposed to unauthorized modification in an information
system, or to establish the validity of a transmission.
Authentication
Security measure designed to establish the validity of a transmission, message, or
originator, or a means of verifying an individual's authorization to receive specific
categories of information
Authorization
Right or a permission that is granted to a system entity to access a system resource
Automated vehicle
Mobile device that includes a control system allowing it to operate either autonomously
or under remote control.
Availability
Probability that an asset, under the combined influence of its reliability, maintainability,
and security, will be
able to fulfill its required function over a stated period of time, or at a given point in time
Border