5.0 Flashcards
MTBF
Mean Time Between Failures
Provides a measure of a system’s reliability and is usually represented in hours. The average time a system or component operates before it fails.
RTO
Recovery Time Objective
Identifies the maximum amount of time it can take to restore a system after an outage.
MTTR
Mean Time To Repair
A common measure of how long it takes to repair a given failure.
RPO
Recovery point objective
Identifies a point in time where data loss is acceptable.
Data Owner
Individual or entity responsible for making decisions about how data is collected, used, protected, and managed within an organization.
Data Controller
Manages the purposes and means by which personal data is processed
Data Processor
Entity processing personal data on behalf of a data controller, following instructions provided by the controller and ensuring data protection and security measures are implemented.
Data Custodian/Steward
Individual or team responsible for the physical or technical aspects of data management, including storage, security, access control, and maintenance, ensuring data integrity and compliance with policies and regulations.
ALE
Annualized Loss Expectancy
Estimated financial impact expected from a specific risk over a year, calculated by multiplying the Single Loss Expectancy (SLE) with the Annualized Rate of Occurrence (ARO).
SLE
Single Loss Expectancy
The value (or cost) of a loss expected from a single event.
ARO
Annualized Rate of Occurrence
Estimation of how often a specific threat or risk is expected to occur within a year
GDPR
General Data Protection Regulation
European Union regulation governing the protection, processing, and transfer of personal data of individuals within the EU and EEA (European Economic Area), focusing on data privacy and rights.
PCI DSS
Payment Card Industry Data Security Standard
Security standard developed by major credit card companies to protect cardholder data, outlining requirements for secure payment processing, data encryption, access control, and compliance validation.
AUP
Acceptable Use Policy
A guideline that defines acceptable and unacceptable behaviors when using a system or service.
Managerial controls
Focus on the management of risk or the management of the cybersecurity system.
Ex. Risk assessments, Vulnerability assessments
Operational controls
Helps ensure that the day-to-day operations of an organization comply with their overall security plan.
Ex. Awareness and training, Configuration management, Media protection, Physical and environmental protection
Technical controls
Use technology such as hardware, software, and firmware to reduce vulnerabilities.
Ex. Encryption, Antivirus software, Firewalls
Preventative (control type)
Act before an event, preventing it from advancing.
Ex. firewalls, encryption, locks
Detective (control type)
Act during an event, alerting operators to specific conditions.
Ex. IDS, SIEM, CCTV
Corrective (control type)
Respond to and fix security incidents after they have been detected. They aim to minimize the impact and restore normal operations.
Ex. incident response plans, patches, backups
Deterrent (control type)
Acts to discourage the attacker by reducing the likelihood of success from the perspective of the attacker.
Ex. security training, warning signs, compliance notices
Compensating (control type)
It is used to meet a requirement when there is no control available to directly address the threat.
Ex. encryption, MFA, network segmentation
Physical (control type)
Are any controls that you can physically touch.
Ex. Key Card Systems, Biometric Scanners, Fire Suppression Systems, HVAC Systems, Fences and Gates, Bollards, Security Guards, Patrols
CSA
Cloud Security Alliance
A nonprofit organization that promotes best practices for cloud security.
Least Privilege
Should have only the rights and privileges necessary to perform its task
Gamification
Intertwines game-design elements within user training methods to increase participation and interaction.
CTF
Capture the Flag
Practice hacking into a server to find data (the flag)
CBT
Computer-based training
A computer program that has self-paced modules to facilitate skill development across a wide range of skills, and the flexibility.