Assets, Threats, and Vulnerabilities: Module 1 Flashcards
(18 cards)
Asset
Something valuable to a company
Asset Classification
Labeling assets by how sensitive or important they are
Asset Inventory
A list of all items that need protection
Asset Management
Tracking valuable items and the risks to them
Compliance
Following rules and standards
Data
Information a computer can use or store
Data at Rest
Data that isn’t being used right now
Data in Transit
Data moving from one place to another
Data in Use
Data currently being used
Information Security (InfoSec)
Keeping data safe from people who shouldn’t see it
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
A set of best practices to help companies manage cyber risks
Policy
A rule to help protect information
Procedures
Steps to follow to do a security task
Regulations
Official rules made by a government or authority
Risk
Something that could harm valuable data or systems
Standards
Guidelines for how to make rules
Threat
Something that could harm a company or its data
Vulnerability
A weakness that a threat could use