Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

, write the definition for each of the 30 terms listed in the table below. Acces

ID: 3894613 • Letter: #

Question

, write the definition for each of the 30 terms listed in the table below.  

Access Control

Accountability

Assessment

Asset

Audit

Availability

Business Impact Assessment (BIA)

Compliance

Confidentiality

Controls

Denial of Service (DoS)

Evidence

Exploit

Governance (IT)

Integrity (system)

IT Control

Information security

Patch management

Penetration test

Policy

Risk

Risk acceptance

Risk Assessment

Risk Management

Standard

Threat

Threat assessment

Vulnerability

Vulnerability assessment

Vulnerability management

Access Control

Accountability

Assessment

Asset

Audit

Availability

Business Impact Assessment (BIA)

Compliance

Confidentiality

Controls

Denial of Service (DoS)

Evidence

Exploit

Governance (IT)

Integrity (system)

IT Control

Information security

Patch management

Penetration test

Policy

Risk

Risk acceptance

Risk Assessment

Risk Management

Standard

Threat

Threat assessment

Vulnerability

Vulnerability assessment

Vulnerability management

Explanation / Answer

Answer:

Access Control:

Access control is a way of limiting access to a system or to physical or virtual resources. In computing, access control is a process by which users are granted access and certain privileges to systems, resources or information.

In access control systems, users must present credentials before they can be granted access. In physical systems, these credentials may come in many forms, but credentials that can't be transferred provide the most security.

Accountability:

Accountability is an assurance that an individual or an organization will be evaluated on their performance or behavior related to something for which they are responsible.

The term is related to responsibility but seen more from the perspective of oversight. An employee may be responsible, for example, for ensuring that a response to an RFP (request for proposals) meets all the stipulated requirements. In the event that the task is not performed satisfactorily, there may or may not be consequences. Accountability, on the other hand, means that the employee is held responsible for successfully completing the task and will have to at least explain why they failed to do so.

Corporate accountability involves being answerable to all an organization’s stakeholders for all actions and results. Through performance and accountability reporting (PAR), for example, an organization compiles and documents factors that quantify its profitability, efficiency and adherence to budget, comparing actual results against original targets. The PAR process is usually carried out once per fiscal year, although in some cases it is done more often.

Corporate accountability also implies that an organization must be answerable for any deviations from its stated goals and values, which might be documented and made publicly available through a mission statement or vision statement. Beyond that, the concept of corporate accountability is often broadened to imply a requirement for business to follow ethical, responsible and sustainable practices.

Assessment:

network assessment is a review of your organization's existing IT infrastructure, management, security, processes, and performance to identify opportunities for improvement and get a comprehensive view of the state of your IT.

Asset:

In information security, computer security and network security, an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information.[1][2] Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization

Audit:

A network security audit is a means by which the ongoing level of performance of an organization'snetwork security can be monitored and it allows for the investigation and pinpointing of chosen trends and specific security incidents. ... The network security audit looks at two broad categories of information.

Availability:

Availability is nothing but In computer systems and networking, availability is a general term that is used to describe the amount of time over a one-year period that the system resources is available in the wake of component failures in the system

Business Impact Assessment (BIA):

Business impact Assessment (BIA) is a component of business continuity planning that helps to identify critical and non-critical systems. A business impact analysis also assigns consequences and usually a dollar figure to specific disaster scenarios. It will also include estimated recovery times and recovery requirements for such scenarios. The business impact analysis is often used to measure the risks of failure against the costs of upgrading a particular system.

Compliance:

Compliance is either a state of being in accordance with established guidelines or specifications, or the process of becoming so. Software, for example, may be developed in compliance with specifications created by a standards body, and then deployed by user organizations in compliance with a vendor's licensing agreement. The definition of compliance can also encompass efforts to ensure that organizations are abiding by both industry regulations and government legislation.

Confidentiality:

Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.

Denial of Service (DoS):

A denial-of-service (DoS) is any type of attackwhere the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.