expand for answer

Data security

Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. The protection of data from accidental or malicious modification, destruction, or disclosure.


Similar items:
(1) Freedom from undesirable events, such as malicious and accidental misuse; how well a system resists penetrations by outsiders and misuse by insiders. (2) The protection of system resources from accidental or malicious access, use, modification, destruction, or disclosure. (3) The protection of resources from damage and the protection of data against accidental or intentional disclosure to unauthorized persons or unauthorized modifications or destruction. Security concerns transcend the boundaries of an automated system.
[view]
(1) The combination of COMSec and COMPUSec the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. (2) Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against denialofservice to authorized users, including those measures necessary to detect, document, and counter such threats. Information Systems Security
[view]
If system security has been broken, the system is considered compromised. Type of incident where information is disclosed to unauthorized individuals or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Unauthorized disclosure or loss of sensitive information.
[view]
(1) The accuracy, completeness and validity of information in accordance with business values and expectations. The property that data or information has not been modified or altered in an unauthorized manner. (2) A security service that allows verification that an unauthorized modification (including changes, insertions, deletions and duplications) has not occurred either maliciously or accidentally. See also data integrity. “Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity. ” (44 USC Sec. 3542)A state characterized by the assurance that modifications are not made by unauthorized users and authorized users do not make unauthorized modifications.
[view]
The probability that a particular threat agent will exploit, or trigger, a particular information system vulnerability and the resulting mission/business impact if this should occur. ISrelated risks arise from legal liability or mission/business loss due to (1) unauthorized (malicious, nonmalicious, or accidental) disclosure, modification, or destruction of information; (2) nonmalicious errors and omissions; (3) IS disruptions due to natural or manmade disasters; (4) failure to exercise due care and diligence in the implementation and operation of the IS.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in