expand for answer
Data security
Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. The protection of data from accidental or malicious modification, destruction, or disclosure.
Similar items:
(1) Freedom from undesirable events, such as malicious and accidental misuse; how well a system resists penetrations by outsiders and misuse by insiders. (2) The protection of system resources from accidental or malicious access, use, modification, destruction, or disclosure. (3) The protection of resources from damage and the protection of data against accidental or intentional disclosure to unauthorized persons or unauthorized modifications or destruction. Security concerns transcend the boundaries of an automated system.
[view]
[view]
(1) The combination of COMSec and COMPUSec the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. (2) Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against denialofservice to authorized users, including those measures necessary to detect, document, and counter such threats. Information Systems Security
[view]
[view]
If system security has been broken, the system is considered compromised. Type of incident where information is disclosed to unauthorized individuals or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. Unauthorized disclosure or loss of sensitive information.
[view]
[view]
The probability that a particular threat agent will exploit, or trigger, a particular information system vulnerability and the resulting mission/business impact if this should occur. ISrelated risks arise from legal liability or mission/business loss due to (1) unauthorized (malicious, nonmalicious, or accidental) disclosure, modification, or destruction of information; (2) nonmalicious errors and omissions; (3) IS disruptions due to natural or manmade disasters; (4) failure to exercise due care and diligence in the implementation and operation of the IS.
[view]
[view]
The net mission/business impact considering the probability that a particular threat source will exploit, or trigger, a particular information system vulnerability, and the resulting impact if this should occur. ITrelated risks arise from legal liability or mission/business loss due to, but not limited to, (1) unauthorized (malicious, nonmalicious, or accidental) disclosure, modification, or destruction of information; (2) nonmalicious errors and omissions; (3) IT disruptions due to normal or manmade disasters; (4) failure to exercise due care and diligence in the implementation and operation of the IT.
[view]
[view]
There are no comments yet.