What are the three components of the CIA triad?
What does Confidentiality protect against?
The unauthorized disclosure of sensitive information.
What are some examples of Confidentiality controls?
Firewalls, access control lists, encryption.
What is an example of Integrity control?
Hashing.
What are some examples of Availability controls?
Fault tolerance, clustering, backups.
What is Nonrepudiation?
Nonrepudiation means that someone who performed some action cannot later deny having taken that action.
What is a common example of Nonrepudiation control?
Digital signatures.
What are the three key threats to cybersecurity?
Disclosure, Alteration and Denial.
What are the five main types of risks that organizations may face as result of a breach?
What are Control Objectives?
Control objectives are statements of a desired security state for an organization.
What are Security Controls?
Security controls are specific measures that fulfill the security objectives of an organization.
What is a Gap Analysis?
A cybersecurity review where a security professional checks the control objectives for an organization and then examines the controls designed to achieve those objectives to make sure they are working as intended.
Name the four Security Control Categories.
Name the six Security Control Types.
Name the three states in which data might exist.
What is the purpose of Data Minimization?
Data minimization seeks to reduce risk by reducing the amount of sensitive data that is maintained on a regular basis.