Chapter 1 Flashcards

(33 cards)

1
Q

Adequate Security

A

Security equivalent with the risk and magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Controls

A

Controls implemented through policy and procedures. Examples include: access control processes and requiring multiple personnel to conduct specific operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Artificial Intelligence

A

Ability of computers and robots to simulate human intelligence and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

Anything of value owned by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Access control process validating identity being claimed by a user/entity is known to the system by comparing one (single factor) or more (multifactor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Right or permission that is granted to a system entity to access a system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

Ensuring timely and reliable access to and use of information by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baseline

A

lowest level of security configuration allowed by a standard or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric

A

biological characteristics of an individual, such as fingerprint, hand geometry, voice, iris patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot

A

malicious code acting like a remote controlled robot for an attacker with trojan/worm capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

characteristic of data/information when not made availability or disclosed to unauthorized persons/processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Criticality

A

measure of degree to which an organization depends on the information/system for success of mission/business function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Integrity

A

property that data has not been altered in an unauthorized manner- covers data in storage, during processing, and while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

process and act of converting message from plaintext to ciphertex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

General Data Protection Regulation (GDPR)

A

European Union passed this to address personal privacy, deeming it an individual human right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Institute of Electrical and Electronic Engineers

A

Professional organization that sets standards for telecommunications, computer engineering and similar disciplines

17
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

Most important healthcare information regulation in the US. Protects the privacy of individual health information and electronic healthcare transactions.

18
Q

International Organization of Standards (ISO)

A

ISO develops voluntary international standards in collaboration with partners in international standardization, International Electro-technical Commission, and International Telecommunication Union

19
Q

Internet Engineering Task Force (IETF)

A

Internet standards organization that defines protocol standards through a process of collaboration and consensus

20
Q

Likelihood

A

Probability potential vulnerability may be exercised

21
Q

Multi-factor Authentication

A

Using 2 or more distinct instances of the three factors of authentication (something you know, something you have, something you are) for identity verification

22
Q

National Institute of Standards and Technology

A

part of US Dept of Commerce, sets standards in several areas

23
Q

Non-repudiation

A

Inability to deny taking an action such as creating information. approving information and sending or receiving a message, cannot deny the validity of the action taken because of their signature

24
Q

Physical controls

A

Controls implemented through a tangible mechanism

25
Qualitative Risk Analysis
method for risk analysis- based on Low, Medium or High
26
Quantitative Risk Analysis
method for risk analysis- numerical values are assigned to both impact and likelihood
27
Risk acceptance
determining potential benefits of a business function outweigh possible risk
28
Risk avoidance
Determining the impact and/or likelihood of specific risk is too great to be offset by potential benefits and not performing a certain business function because of that determination
29
Risk Management Framework
structured approach to oversee and manage risk for an enterprise
30
Risk tolerance
level of risk an entity is willing to assume to achieve a potential desired result
31
Risk transference
paying external party to accept financial impact of a given risk
32
System integrity
Quality a system has when it performs intended function in an unimpaired manner, free from unauthorized manipulation of a system, whether intentional or accidental
33
Threat vector
Means by which a threat actor carries out their objectives