Play It Safe - Manage Security Risks: Module 2 Flashcards
(25 cards)
Asset
An item that has value to an organization.
Attack Vectors
Ways attackers try to get past security defenses.
Authentication
Verifying who someone is.
Authorization
Giving access to certain resources.
Availability
Making sure data is accessible to the right people.
Biometrics
Unique body traits used to verify identity (like fingerprints).
Confidentiality
Only authorized users can access certain data.
CIA Triad
A model for managing risk using confidentiality, integrity, and availability.
Detect
NIST function for finding security issues quickly and efficiently.
Encryption
Turning readable data into a secret code.
Govern
NIST function for setting and managing cybersecurity strategies.
Identify
NIST function for managing cybersecurity risks and assets.
Integrity
Making sure data is accurate and trustworthy.
NIST CSF
A voluntary guide to help manage cybersecurity risk.
NIST SP 800-53
Security rules for U.S. federal information systems.
OWASP
A non-profit that improves software security.
Protect
NIST function for using tools and training to reduce threats.
Recover
NIST function for restoring systems after an incident.
Respond
NIST function for handling and learning from security incidents.
Risk
Anything that can harm data’s safety, accuracy, or access.
Security Audit
A check of an organization’s security rules and practices.
Security Controls
Tools or rules to lower specific security risks.
Security Frameworks
Guides for planning how to reduce cybersecurity risks.
Security Posture
How ready an organization is to protect and respond to threats.