Assets, Threats, and Vulnerabilities Flashcards
Asset classification
The practice of labeling assets based on sensitivity and importance to an organization.
This helps prioritize security measures.
Asset inventory
A catalog of assets that need to be protected.
It is essential for effective asset management.
Asset management
The process of tracking assets and the risks that affect them.
It ensures that assets are secure and effectively utilized.
Data
Information that is translated, processed, or stored by a computer.
Data can be structured or unstructured.
Data at rest
Data not currently being accessed.
Examples include files stored on a hard drive.
Data in transit
Data traveling from one point to another.
This includes data sent over the internet or a network.
Data in use
Data being accessed by one or more users.
This is often the most vulnerable state of data.
Information security (InfoSec)
The practice of keeping data in all states away from unauthorized users.
It encompasses various security measures and policies.
Policy
A set of rules that reduce risk and protect information.
Policies guide the organization’s security posture.
Procedures
Step-by-step instructions to perform a specific security task.
They ensure consistent execution of security measures.
Regulations
Rules set by a government or other authority to control the way something is done.
Regulations can dictate compliance requirements.
Standards
References that inform how to set policies.
They provide a baseline for compliance and best practices.
Likelihood x Impact = Risk
One way to interpret risk is to consider the potential effects that negative events can have on a business. A way to present this idea is with a specific calculation.
Restricted, confidential, internal-only, and public
The 4 most common classification schemes.
Restricted
Highest level classification scheme. This category is reserved for incredibly sensitive assets, like need-to-know information.
Confidential
Second highest classification scheme. This scheme refers to assets whose disclosure may lead to a significant negative impact on an organization.
Internal-only
Third highest classification scheme. This scheme describes assets that are available to employees and business partners.
Public
This is the lowest level classification scheme. These assets have no negative consequences to the organization if they’re released.
Risk register
A central record of potential risks to an organization’s assets, information systems, and data.
Access controls
Security controls that manage access, authorization, and accountability of information.
Access controls are essential for protecting sensitive data from unauthorized access.
Algorithm
A set of rules used to solve a problem.
Algorithms are fundamental to programming and data processing.
Application programming interface (API) token
A small block of encrypted code that contains information about a user.
API tokens are commonly used for authentication in web services.
Asymmetric encryption
The use of a public and private key pair for encryption and decryption of data.
Asymmetric encryption enhances security by using two keys instead of one.
Basic auth
The technology used to establish a user’s request to access a server.
Basic auth is a simple authentication scheme built into the HTTP protocol.
Bit
The smallest unit of data measurement on a computer.
A bit can be either 0 or 1.
Brute force attack
The trial and error process of discovering private information.
Brute force attacks are often used to crack passwords.
Cipher
An algorithm that encrypts information.
Ciphers can be symmetric or asymmetric.
Cryptographic key
A mechanism that decrypts ciphertext.
Cryptographic keys are crucial for data security.