Remember This Flashcards
(189 cards)
A use case helps:
professionals identify and clarify requirements to achieve a goal
Confidentiality ensures:
that data is only viewable by authorized users
Encryption is the:
best choice to provide confidentiality
Access controls protect:
the confidentiality of data
Steganography supports:
obfuscation by making the hidden data harder to see
Integrity provides:
assurances that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes
Hashing is a common method:
of ensuring integrity
Non-repudiation prevents:
entities from denying they took an action
Digital signatures provide what 2 things?
non-repudiation
integrity for files and email
Audit logs provide:
non-repudiation
Availability ensures:
that data and services are available when needed
Risk is:
the possibility of a threat exploiting a vulnerability, resulting in a loss
A threat is:
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability
A vulnerability is:
a weakness in either the hardware, software, configuration, or users operating the system
Risk mitigation reduces risk by:
reducing the chances that a threat will exploit a vulnerability
by reducing the impact of the risk
Security controls reduce:
risks
The three primary security control types are:
technical
administrative
physical
A technical control is:
one that uses technology to reduce vulnerabilities
Some examples of technical controls are:
Encryption
antivirus software
IDSs
firewalls
the principle of least privilege
Administrative controls are:
primarily administrative and include items such as risk and vulnerability assessments
Preventive controls attempt to:
prevent security incidents
Detective controls attempt to:
detect when a vulnerability has been exploited
Corrective controls attempt to:
reverse the impact of an incident or problem after it has occurred
Deterrent controls attempt to:
prevent incidents by discouraging threats