expand for answer

Compromise

If system security has been broken, the system is considered compromised. Type of incident where information is disclosed to unauthorized individuals or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Unauthorized disclosure or loss of sensitive information.


Similar items:
A violation, or imminent threat of a violation, of a security policy or practice within the organization. Computer security incidents are the result of an attack, malware infection, or inappropriate usage by employees. See incident.
[view]
Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. The protection of data from accidental or malicious modification, destruction, or disclosure.
[view]
(1) Freedom from undesirable events, such as malicious and accidental misuse; how well a system resists penetrations by outsiders and misuse by insiders. (2) The protection of system resources from accidental or malicious access, use, modification, destruction, or disclosure. (3) The protection of resources from damage and the protection of data against accidental or intentional disclosure to unauthorized persons or unauthorized modifications or destruction. Security concerns transcend the boundaries of an automated system.
[view]
(1) The combination of COMSec and COMPUSec the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. (2) Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against denialofservice to authorized users, including those measures necessary to detect, document, and counter such threats. Information Systems Security
[view]
(1) The accuracy, completeness and validity of information in accordance with business values and expectations. The property that data or information has not been modified or altered in an unauthorized manner. (2) A security service that allows verification that an unauthorized modification (including changes, insertions, deletions and duplications) has not occurred either maliciously or accidentally. See also data integrity. “Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity. ” (44 USC Sec. 3542)A state characterized by the assurance that modifications are not made by unauthorized users and authorized users do not make unauthorized modifications.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in