Compromise: In the realm of information security, a compromise refers to a situation where unauthorized access is gained to a system or data, violating the confidentiality, integrity, or availability of the information. This could be due to an external attack, insider threat, or inadvertent actions. The consequences can range from information leakage and system malfunction to financial loss and reputation damage.
Categories: CC D5: Security Operations | CCSP D6: Legal - Risk and Compliance | CISM D3: Information Security Program | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D1: Security Concepts and Practices
Related Articles:
- Glossary: Wireless attacks
- Glossary: Zero-Defect
- Glossary: Watering hole attack
- Glossary: Weak key attack
- Glossary: Virtual machine escape
- Glossary: Temporal Key Integrity Protocol (TKIP)
- Glossary: Threat hunting
- Glossary: TCP Sequence Number Prediction Attack
- Glossary: Stealth virus
- Glossary: Social engineering