Lesson 1: Comparing Security Roles and Security Controls Flashcards
(37 cards)
What does Information Security (InfoSec) refer to?
The protection of data resources from unauthorized access, attack, theft, or damage.
What is the protection of data resources from unauthorized access, attack, theft, or damage referred to as?
Information Security (InfoSec).
How many properties comprise Secure Information?
Three.
What are the properties of Secure Information referred to as?
CIA Triad.
The CIA Triad are referred to as the properties of what?
Secure Information.
What does CIA Triad stand for?
Confidentiality, Integrity, Availability.
What is the CIA Triad also referred to as?
AIC.
AIC is also referred to as?
CIA Triad.
Define Confidentiality.
Certain information should only be known to certain people.
What word explains that certain information should only be known to certain people.
Confidentiality.
Define Integrity.
Data is stored and transferred as intended and that any modification is authorized.
What word explains that data is stored and transferred as intended and that any modification is authorized?
Integrity.
Define Availability.
Information is accessible to those authorized to view or
modify it.
What word explains that information is accessible to those authorized to view or
modify it.
Availability.
What is an example of another property that secure systems should exhibit?
Non-repudiation.
Define non-repudiation.
A subject cannot deny doing something, such as creating, modifying, or
sending a resource.
What word explains that a subject cannot deny doing something, such as creating, modifying, or sending a resource.
Non-repudiation.
What does cybersecurity refer to?
Provisioning secure processing hardware and software.
What is the provisioning secure processing hardware and software referred to as?
Cybersecurity.
How many functions can information and cyber security be classified as?
Five.
Who developed the functions that information and cyber security be classified as?
National Institute of Standards and Technology (NIST).
What is the National Institute of Standards and Technology (NIST) known for?
Developing the functions that classify information and cyber security functions.
What are the five functions that classify information and cyber security?
Identify, Protect, Detect, Respond, Recover.
Based on NIST, define Identify.
Develop security policies and capabilities that evaluate risks, threats, and
vulnerabilities and recommend security controls to mitigate them.