Chapter 1 Flashcards

1
Q

Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The requirements that are set forth by laws and industry regulations

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

C.I.A.

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allowing only those authorized to access the data requested

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keeping data unaltered by Accidental or Malicious intent

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ability to access data when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The physical disposition of the media on which the data is stored

A

Possession/Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows you to say whether you’ve attributed the data in question to the proper owner or creator

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How useful the data is

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks that allow unauthorized users to access your data, applications, or environments, and are primarily an attack against confidentiality

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks that cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis.

A

Interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks that involve tempering with assets.

A

Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacks that involve generating data, processes, communications, or other similar activities with a system.

A

Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The likelihood that an event will occur

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Events that could cause damage to assets

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A weakness that a threat event of the threat agent can take advantage of

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An additional step that is taking into account the value of the asset being threatened

18
Q

Protecting the physical environment in which your system sits, or where your data is stored.

A

Physical Control

19
Q

Protects the systems, networks, and environments that process, transmit, and store your data

A

Technical/Logical Control

20
Q

Dictate how users of your environment should behave and are based on rules, laws, policies, procedures and guidelines

A

Administrative Control

21
Q

A model that adds three more principles to the CIA triad.

A

Parkerian Hexad

22
Q

Three principles added to the C.I.A.by the Parkerian Hexad

A

Possession/Control
Utility
Authenticity

23
Q

Forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimize their impact.

A

Risk Management

24
Q

Risk Management Processes

A

Identify Assets
Identify Threats
Assess Vulnerability
Assess Risks
Mitigate Risks

25
Identifying and categorizing the assets that we are protecting
Identify Assets
26
Identify and categorize the threats that affect the assets. (Once the critical assets have been found)
Identify Threats
27
Any given asset may have thousands or millions of threats that could impact it. It is important to ___________ _____________ in the form of potential threats.
Assess Vulnerabilities
28
We ______ ________ once we have identified the the threats and vulnerabilities for a given asset.
Assess Risks
29
Putting measures in place to help ensure that a given type of threat is accounted for.
Mitigate Risks
30
Measures used to alleviate risk
Control
31
Controls are divided into three categories
Physical Logical Administrative
32
When risk management practices have failed and have caused an inconvenience to a disastrous event, you follow through with _____________
Incident Response
33
Incident Response Cycle steps
Preparation Detection and Analysis Containment Eradication Recovery Post Incident Activity
34
Consists of all the activities you can perform ahead of time to better handle an incident
Preparation
35
This is where the action begins. You detect an issue, decide whether it's actually an incident, and respond to it appropriately.
Detection and Analysis
36
Taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm
Containment
37
The attempt to remove the effects of an issue from our environment
Eradication
38
Restoring devices or data from backup media, rebuilding systems, or reloading applications. Going back to a certain state you were in prior to the indident
Recovery
39
When we attempt to determine specifically what happened, why it happened, and what we can do to keep it form happening again
Post-Incident Activity
40
Latin for after death
post-mortem