Chapter 1 Flashcards

(29 cards)

1
Q

Confidentiality

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disclosure

A

The exposure of sensitive information to unauthorized individuals, also known as data loss. This is a violation of Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alteration

A

The unauthorized modification of information, and is a violation of Integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial

A

The unintended disruption of an authorized user’s legitimate access to information. This violates the principle of Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Financial Risk

A

The risk of monetary damage to the organization as the result of a data breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reputational Risk

A

The risk of negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strategic Risk

A

The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operational Risk

A

The risk to the organization’s ability to carry out its day-to-day functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compliance Risk

A

The risk that when a security breach causes an organization to run afoul of legal or regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Controls

A

Enforce confidentiality, integrity, and availability in the digital space. Examples: firewall rules, access control lists, intrusion prevention systems, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operational Controls

A

The processes that we put in place to manage technology in a secure manner. Examples: access reviews, log monitoring, and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Managerial Controls

A

Procedural mechanisms that focus on the mechanics of the risk management process. Examples: periodic risk assessments, security planning exercises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preventive Controls

A

To stop a security issue before it occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detective Controls

A

To identify security evens that have already occurred.

17
Q

Corrective Controls

A

remediate security issues that have already occurred.

18
Q

Physical Controls

A

Security controls that impact the physical world. Examples: fences, perimeter lighting, locks, alarms.

19
Q

Compensating Controls

A

Designed to mitigate the risk associated with exceptions made to a security policy.

20
Q

Data At Rest

A

Data that resides on hard drives, tapes, in the cloud, or on other storage media.

21
Q

Data In Motion

A

Data that is in transit over a network.

22
Q

Data In Processing

A

Data that is actively in use by a computer system.

23
Q

DLP (Data Loss Prevention)

A

Systems that help organizations enforce information handling policies and procedures to prevent data loss and theft.

24
Q

Pattern Matching

A

DLP mechanism that watches for telltale signs of sensitive information. Examples: a number that is formatted like a Social Security number.

25
Watermarking
Systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags.
26
Data Minimization
A technique that seeks to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
27
Hashing
A function that transforms a value in a dataset to a corresponding has value.
28
Tokenization
Replaces sensitive values with a unique identifier using a lookup table.
29
Masking
Partially redacts sensitive information by replacing some or all sensitive fields with blank characters.