unauthorized modification of information

  • 1information security — The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those… …

    Military dictionary

  • 2Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …

    Wikipedia

  • 3Information sensitivity — Sensitive information is information or knowledge that might result in loss of an advantage or level of security if revealed (disclosed) to others who might have low or unknown trustability and/or indeterminable or hostile intentions.Loss, misuse …

    Wikipedia

  • 4Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …

    Universalium

  • 5National Information Infrastructure Protection Act — The National Information Infrastructure Protection Act (Pub.L. 104 294, 110 Stat. 3488, enacted October 11, 1996; H.R. 3723) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse… …

    Wikipedia

  • 6Automated information systems security — In telecommunication, the term automated information systems security refers to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The… …

    Wikipedia

  • 7несанкционированное изменение информации — Изменение содержания информации при ее обработке, хранении или передаче с нарушением установленных прав и правил разграничения доступа. [ОСТ 45.127 99] Тематики защита информации Обобщающие термины угроза информационной безопасности… …

    Справочник технического переводчика

  • 8Digital forensics — Forensic science Physiological sciences …

    Wikipedia

  • 9Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… …

    Wikipedia

  • 10Parkerian Hexad — The Parkerian hexad is a set of six elements of information security proposed by Donn B. Parker. The term was coined by M. E. Kabay. The Parkerian hexad adds three additional attributes to the three classic security attributes of the CIA triad… …

    Wikipedia