BUSI 4404 Chapter Notes - Chapter 11: Denial-Of-Service Attack, Ipsec, Public Key Infrastructure

37 views3 pages

Document Summary

Confidentiality: protection of organizational data from unauthorized disclosure. Integrity: assurance that data have not been altered or destroyed. Availability: the degree to which information and systems are accessible to authorized users. Threats to business continuity: disruptions, destruction of data, disasters. Threat of unauthorized access (intrusion): external attackers exist, but most unauthorized access incidents involve employees. Network controls: are safeguards that reduce or eliminate threats to network security. Preventative controls: mitigate or stop a person from acting or an event from occurring. Act as a deterrent by discouraging or restraining. Detective controls: reveal or discover unwanted events (e. g. , auditing). Corrective controls: remedy an unwanted event or intrusion. Risk assessment: a key step in developing a secure network. Octave: operationally critical threat, asset, and vulnerability evaluation. Cobit: control objectives for information and related technology. Nist guide: risk management guide for information technology systems. Develop risk measurement criteria (step 1): the measures used to examine how threats impact the organization.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents