PRELIM QUIZ COMPILATION Flashcards
(30 cards)
MODULE 4
Its objective is to prevent cyber threats.
- Network Security
MODULE 4
A components of Network Security that Controls the incoming and outgoing network traffic.
- Firewalls
MODULE 4
A components of Network Security that Detects and removes malicious software In your device.
– Antivirus and anti-malware
MODULE 4
A republic act that enacted to protects the personal information.
– RA 10173
MODULE 4
A republic act that addresses the crime committed using digital technology.
– RA 10175
MODULE 4
It’s a network security threats that means there’s someone that Intercepting communication.
–Man in the middle
MODULE 4
A components of Network Security that we used to secure remote access.
–VPN
MODULE 4
It’s a principle of secure network design that used to layered security approach.
– Defense in Depth
MODULE 4
It’s a principle of secure network design that means Continuous verification and authentication.
– Zero Trust Model
MODULE 4
Make a one sentence on what have you learned for today’s topic?
MODULE 3
______________ involves identifying potential hazards, evaluating the likelihood and impact of those hazards, and determining the necessary actions to reduce or eliminate risks.
– Risk Assessment
MODULE 3
It’s a type of data that can be type and need a smaller size storage.
– Structured data
MODULE 3
It’s a type of data that needs a bigger size of storage.
–Unstructured data
MODULE 3
____________ refers to the framework, policies, and processes established to ensure the organization’s security objectives align with business goals.
– Information Security Governance
MODULE 3
Conclusion
GOOD GOVERNANCE IS THE FOUNDATION OF A SECURE FUTURE
MODULE 2
It’s one of the risk mitigation strategies that means taking action before something happens.
Proactive Measures
MODULE 2
It’s one of the risk mitigation strategies that means responding to something after it happens.
Reactive Measures
MODULE 2
is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.
Risk Management
MODULE 2
Key Elements of Risk Management
Risk Identification, Risk Assessment, Risk Mitigation, Risk monitoring and review
MODULE 2
is a set of rules and guidelines that govern how an organization protects its assets, data, and systems from unauthorized access or attacks.
Security Policies
MODULE 2
Standard for securing credit card information
PCI-DSS
MODULE 2
International standard for information security management.
ISO/IEC 27001
MODULE 2
Sets requirements for the protection of health information in the U.S.
HIPAA
MODULE 2
Give 4 types of risk in an organization.
Operational risk, Financial risk, Reputational risk, Compliance risk, Cybersecurity risk