Chapter 1 Flashcards

(59 cards)

1
Q

It is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA means?

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The purpose of these terms is to describe security using relevant and meaningful words that make security more understandable to management and users, and define its purpose.

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring that information is only accessible to those authorized to view it.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maintaining the accuracy and reliability of data, ensuring it is not altered or tampered with.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensuring that information and resources are accessible to authorized users when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a term related to the area of confidentiality. It pertains to any data about an individual that could be used to identify them.

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a measure of the importance assigned to information by its owner, or the purpose of denoting its need for protection.

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of verifying or proving the user’s identification is known as ‘’_______”.
It is a process to prove the identity of the requestor.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a crucial principle in information security that ensures that a party in a transaction cannot deny the authenticity of their signature on a document or the sending of a message itself.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a legal term and is defined as the protection against an individual falsely denying having performed a particular action.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the right of an individual to control the distribution of information about themselves.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a measure of the extent to which an entity is threatened by a potential circumstance or event. It is often expressed as a combination of:
The adverse impacts that would arise if the circumstance or event occurs; and
The likelihood of occurrence.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It is something in need of protection.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a gap or weakness in those protection efforts.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is an inherent weakness or flaw in a system or component, which, if triggered or acted upon, could cause a risk event to occur.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is something or someone that aims to exploit a vulnerability to thwart protection efforts.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It includes trade secrets, research, business plans and intellectual property

A

Classified or sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is information that if improperly disclosed (confidentiality) or modified (integrity) would harm an organization or individual.

A

Sensitive Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Measured the degree to which something is whole and complete, internally consistent and correct.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is the assurance that data has not been altered in an unauthorized manner.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It requires the protection of the data in systems and during processing to ensure that it is free from improper modification, errors or loss of information and is recorded, used and maintained in a way that ensures its completeness.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

As part of data integrity, requires that all instances of the data be identical in form, content and meaning.

25
refers to the maintenance of a known good configuration and expected operational function as the system processes the information.
System Integrity
26
It can be defined as (1) timely and reliable access to information and the ability to use it, and (2) for authorized users, timely and reliable access to data and information services.
Availability
27
It is often associated with the term criticality, because it represents the importance an organization gives to data or an information system in performing its operations or achieving its mission.
Availability
28
Three common methods of authentication
1. Something you know 2. Something you have 3. Something you are
29
2 methods of Authentication
1. Single-factor Authentication (SFA) 2. Multi-factor Authentication (MFA)
30
It ensure that communication or transactions cannot be denied by the involved parties. This is usually achieved through digital signatures, timestamps, and transaction logs.
Non-repudiation mechanisms
31
Are cryptographic equivalents of handwritten signatures or stamped seals. They provide proof of origin, identity, and status of an electronic document.
Digital Signatures
32
Common Threats to Information Security (3)
1. Malware 2. Phishing Attacks 3. Insider Threats
33
Type of threats: Malicious software designed to harm or exploit any programmable device or network. Examples include viruses, worms and ransomware.
Malware
34
Type of threats: Deceptive attempts to obtain sensitive information by masquerading as a trustworthy entity in electronic communications.
Phishing Attacks
35
Type of threats: Risks posed by individuals within an organization, such as employees or contractors, who may misuse access to information.
Insider Threats
36
Effective Protection Strategies (3)
1. Encryption 2. Regular software updates 3. Employee training
37
reflects the potential adverse impacts that result from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems.
Information Security Risks
38
The means by which a threat actor carries out their objectives
Threat Vector
39
is an inherent weakness or flaw in a system or component, which, if triggered or acted upon, could cause a risk event to occur.
Vulnerability
40
is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.
Likelihood of occurrence
41
is the magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.
Impact
42
It involves looking at your unique company and analyzing its unique situation.
Risk Identification
43
is defined as the process of identifying, estimating and prioritizing risks to an organization’s operations (including its mission, functions, image and reputation), assets, individuals, other organizations and even the nation.
Risk assessment
44
relates to making decisions about the best actions to take regarding the identified and prioritized risk.
Risk treatment
45
is the decision to attempt to eliminate the risk entirely.
Risk avoidance
46
is taking no action to reduce the likelihood of a risk occuring.
Risk acceptance
47
it is the most common type of risk management and includes taking actions to prevent or reduce the possibility of a risk event or its impact.
Risk mitigation
48
it is the practice of passing the risk to another party, who will accept the financial impact of the harm resulting from a risk being realized in exchange for payment.
Risk transference
49
pertain to the physical, technical and administrative mechanisms that act as safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity and availability of the system and its information.
Security Controls
50
address process-based security needs using physical hardware devices, such as badge readers, architectural features of buildings and facilities, and specific security actions to be taken by people.
Physical controls
51
(also called logical controls) are security controls that computer systems and networks directly implement.
Technical Controls
52
These controls can provide automated protection from unauthorized access or misuse, facilitate detection of security violations and support security requirements for applications and data.
Technical controls
53
(also known as managerial controls) are directives, guidelines or advisories aimed at the people within the organization.
Administrative Control
54
They provide frameworks, constraints and standards for human behavior, and should cover the entire scope of the organization’s activities and its interactions with external parties and stakeholders.
Administrative control
55
refers to the systems, processes, and rules that guide decision-making and the behavior of individuals in an organization or institution.
Governance
56
are commonly issued in the form of laws, usually from government (not to be confused with governance) and typically carry financial penalties for noncompliance.
Regulations
57
are often used by governance teams to provide a framework to introduce policies and procedures in support of regulations.
Standards
58
are put in place by organizational governance, such as executive management, to provide guidance in all activities to ensure that the organization supports industry standards and regulations.
Policies
59
are the detailed steps to complete a task that support departmental or organizational policies.
Procedures