- operation of hardware
- design of software
- accuracy of data (correspondent with real world & up to date)
Accuracy
- in correspondence with real world & up to date
- data accessibility
- hardware functionality
Integrity
- safeguarding the accuracy
- no integrity if data is changed accidentally or tampered with
- completeness
- security (prevents data from being lost, stolen, cracked)
- safety (data is clean against virus/ malicious worms)
- quality
Security
- protection of software, hardware, machines, networks against
- unauthorized access, use, disruption, destruction, disclosure
- concerned with:
- confidentiality/ privacy
- integrity
- availability (security controls to make sure system is up and running)
- authenticity (ensuring data is genuine)
Assurance
- level of guarantee that a system will run expectedly
Countermeasure
- stop a threat from triggering a risk event against security
Defence in depth
- never rely on a single security measure
Exploit
- vulnerability triggered by an event: risk is 100%
Risk
- possible event that can cause loss
Vulnerability
- weakness in a target that can potentially be exploited by a threat security
Privacy
- groups & individuals have the right to determine to what extent, how, to whom, when their information is disclosed
Data mining
- searching & analyzing masses of data to find patterns & develop new information or knowledge
Computer profiling
- analyzing data in computer files to determine characteristics of people who are likely to engage in certain behaviour
Data protection should ideally be
- obtained lawfully and fairly
- used only for specified purpose
- adequate, not too much
- kept secure
- destroyed after its use
- accurate & up to date
Anonymity
- information that may result in the end user’s identification is not disclosed
- your name not being revealed
- it’s a security service
Intellectual property
- works of the mind that are