Play It Safe - Manage Security Risks: Module 2 Flashcards

(25 cards)

1
Q

Asset

A

An item that has value to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vectors

A

Ways attackers try to get past security defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verifying who someone is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

Giving access to certain resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Making sure data is accessible to the right people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometrics

A

Unique body traits used to verify identity (like fingerprints).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

Only authorized users can access certain data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA Triad

A

A model for managing risk using confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detect

A

NIST function for finding security issues quickly and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption

A

Turning readable data into a secret code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Govern

A

NIST function for setting and managing cybersecurity strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify

A

NIST function for managing cybersecurity risks and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Making sure data is accurate and trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST CSF

A

A voluntary guide to help manage cybersecurity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST SP 800-53

A

Security rules for U.S. federal information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OWASP

A

A non-profit that improves software security.

17
Q

Protect

A

NIST function for using tools and training to reduce threats.

18
Q

Recover

A

NIST function for restoring systems after an incident.

19
Q

Respond

A

NIST function for handling and learning from security incidents.

20
Q

Risk

A

Anything that can harm data’s safety, accuracy, or access.

21
Q

Security Audit

A

A check of an organization’s security rules and practices.

22
Q

Security Controls

A

Tools or rules to lower specific security risks.

23
Q

Security Frameworks

A

Guides for planning how to reduce cybersecurity risks.

24
Q

Security Posture

A

How ready an organization is to protect and respond to threats.

25
Threat
Something that could harm an organization’s assets.