Terms and definitions from Course 1, Module 3 Flashcards

(17 cards)

1
Q

What is an Asset?

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Availability refer to?

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Compliance?

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Confidentiality mean?

A

The idea that only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CIA triad?

A

A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is a Hacktivist?

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HIPAA?

A

A U.S. federal law established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Integrity refer to in data?

A

The idea that the data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the NIST Cyber Security Framework (CSF)?

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Privacy protection?

A

The act of safeguarding personal information from unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Protected health information (PHI)?

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Security architecture?

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Security controls?

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Security ethics?

A

Guidelines for making appropriate decisions as a security professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Security frameworks?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Security governance?

A

Practices that help support, define, and direct security efforts of an organization

17
Q

What is Sensitive personally identifiable information (SPII)?

A

A specific type of PII that falls under stricter handling guidelines