Confidentiality - Assurance that the information is accessible on to those authorized to have access
Integrity - The trustworthiness of data or resources in terms of preventing improper or unauthorized
changes
Availability - Assurance that the systems responsible for delivering, storing, and processing information
are accessible when required by the authorized users
Authenticity - Refers to the characteristic of a communication, document, or any data that ensures the
quality of being genuine
Non-Repudiation - A guarantee that the sender of a message cannot later deny having sent the message
and that the recipient cannot deny having received the message
Identification - The act of a user to make a claim as to who they are to access a resource.
Authentication - The act of validating the claim made by a user to access a resource
Authorization - The act of of adding or denying individual user access to a computer, network and/or its
resources
Accounting - The record-keeping and tracking of user activities on a computer network
Abend - Abnormal ending aka "system crash"
Close-in Attack - An attack that is performed when the attacker is in close physical proximity with the
target system or network in order to gather, modify, or disrupt access to information.
, Distribution Attacks - An attack that occurs when attackers when attackers tamper with hardware or
software prior to installation.
Defensive Warfare - The actions taken by the team or person responsible for defending an
organization's computer network(s).
Offensive Warfare - The actions take by a team or person responsible for attacking an organization's
computer network(s) to help the defending team improve their defenses for the network(s).
Cyber Kill Chain - A methodology that is a component of intelligence-driven defense for the
identification and prevention of malicious intrusion activities.
Black Hat Hackers - Individuals who use their extraordinary computing skills for illegal or malicious
purposes.
White Hats (Penetration Testers) - Individuals who use their hacking skills for defensive purposes.
Gray Hats - Individuals who work both offensively and defensively at various times.
Black Box Testing - Testing an environment when you have no knowledge of it.
White Box Testing - Testing an environment when you have full knowledge of it.
Gray Box Testing - Testing an environment when you have partial knowledge of it.
Suicide Hackers - Individuals who aim to bring down critical infrastructure for a "cause" and are not
worried about facing jail terms or any other kind of punishment.
Hacktivist - Individuals who promote a political agenda by hacking, especially by defacing or disabling
websites.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.48. You're not tied to anything after your purchase.