Section 2 - Lesson 5 Flashcards

Threats and Vulnerabilities (6 cards)

1
Q

Threat

A

Anything that could cause harm, loss, damage or compromise to information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

External threats examples

A

Cyber-attacks, Natural disasters, Data integrity breaches, Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability

A

Any weakness in the system design or implementation. They come from internal factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is coursing vulnerabilities (examples)

A

Software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When risk appears?

A

When threat and vulnerability intersects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk management

A

Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes = get outcome you want, not random risky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly