Threats and Vunerabilities Flashcards
(73 cards)
Risk
Anything that can impact the confidentiality, integrity or availability of an asset
Asset
an item perceived as having value to an organization.
Threat
any circumstances or event that can negatively impact assets.
Vulnerability
a weakness that can be exploited by a threat.
Asset management
the process of tracking assets and risk that affect them
asset inventory
a catalog of assets that need to be protected
asset classification
the practice of labeling assets based on sensitivity and importance to organization
level of asset classification
- Public
- Internal
- Confidential
4.Restricted
Data
is information that is translated, processed, or stored by a computer.
States of data
- in use
- In transit
- At rest
data in use
is data being accessed by one or more user
data in transit
data traveling from one point to another
data at rest
data not currently being accessed
information security (infoSec)
The practice of keeping data in all states away from unauthorized users.
Type of risk categories
- Damage
- Disclose
- Loss of information
Elements of a security plan
1.Polices
2. Standards
3. Procedures
Policy
a set of rules that reduce risk and protect information
Standards
references that inform how to set policies
procedures
step by step instructions to perform a specific security task
Ccompliance
the process of adhering to internal standards and external regulations
regulations
rules set by a government or other authority to control the way something is done.
NIST Cybersecurity Framework (CSF)
a voluntary framework that consist of standards, guidelines and best practices to manage cybersecurity risk.
NIST CSF frameowkrs
- Core
- Tiers
- Profiles
Five functions of the NIST CSF
- Identify
2.Protect - Detect
- Respond
- Recover