1.3 Surveying the Cyberspace Flashcards

1
Q

Security architecture

A

unified security design that addresses the necssitites and potential risks involved in a certain scenario or environment.
-specifies when and where to apply security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security operations

A

The process that identifies critical information to determine if friendly actions can be observed by enemy intelligence and if information obtained by adversaries could be useful to them, and then executes selected measures that eliminates or reduce adversary exploitation of friendly critical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Governance:

A

framework for managing performance and risk, oversight of compliance and control responsibilities, and defining the cyber mission by mapping the structure, authority, and processes to create an effective program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical security

A

The protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage to an enterprise, agency, or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism, and terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat intelligence

A

Evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging threat to assets, which can be used to inform decisions about responding to that threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Career development:

A

Training of future cybersecurity professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk assessment:

A

Analyzing what can go wrong, how likely it is to happen, what the potential consequences are, and how tolerable the identified risk is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User education

A

Teaching users how to protect themselves from cyberattacks by informing them of risks, exploits, and external threats as well as teaching them the skills needed to combat common attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frameworks and standards:

A

The creation of new security frameworks and practices for professionals to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly