What are the highest security concerns for senior executives?
Breaches of data, theft, service interruptions, and regulatory non-compliance
These concerns are critical for IT governance.
What occurs during a data breach?
Information is compromised and utilized without the authorization of the owner.
Define service disruptions.
An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time.
What can result from failing to comply with cybersecurity regulations?
Fines and financial penalties.
What is a cyberattack?
Any kind of malicious activity that targets computer information systems, infrastructures, networks, or devices.
What is a threat agent?
An internal or external attacker that could negatively impact data security.
List types of threat agents.
What are network-based attacks?
Attacks that target the infrastructure of a network to gain unauthorized access or disrupt operations.
Name examples of network-based attacks.
What do application-based attacks target?
Specific software or applications to gain unauthorized access or disrupt functionality.
Provide examples of application-based attacks.
What is a social engineering attack?
Attacks that use psychological manipulation to get employees to divulge sensitive information.
Name some examples of social engineering attacks.
What are the stages in a cyberattack?
What is cloud computing?
A way for organizations to store, use, process, and share data without needing to own or manage the resources.
List risks specific to cloud computing.
What are the risks related to mobile devices?
Define threat modeling.
The process of identifying, analyzing, and mitigating threats to a network, system, or application.
What is the CIA Triad?
Confidentiality, Integrity, and Availability.
List the phases of threat modeling.
What does COSO stand for?
Committee of Sponsoring Organizations.
What are the five components of the COSO internal control framework?
What is an acceptable use policy (AUP)?
A control document created to regulate and protect technology resources.