Assets, Threats, & Vulnerabilities Flashcards
Asset
item perceived as having value to an organization
Asset inventory
catalog of assets that need to be protected
Asset classification
practice of labeling assets based on sensitivity and importance to an organization
Asset management
process of tracking assets and the risks that affect them
Compliance
process of adhering to internal standards and external regulations
Data
information that is translated, processed, or stored by a computer
Data at rest
data not currently being accessed
Data in transit
data traveling from one point to antoher
Data in use
data being accessed by one or more users
Information security (InfoSec)
practice of keeping data in all states away from unauthorized users
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Policy
set of rules that reduce risk and protect information
Procedures
step-by-step instructions to perform a specific security task
Regulations
Rules set by a government or other authority to control the way something is done
Risk
Anything that can impact confidentiality, integrity, and availability of an asset
Standards
References that inform how to set policies
Threat
Any circumstances or event that can negatively impact assets
Vulnerability
weakness that can be exploited by a threat
Access controls
security controls that manage access, authorization, and accountability of information
Algorithm
set of rules used to solve a problem
Application programming interface (API) token
small block of encrypted code that contains information about a user
Asymmetric encryption
use of public and private key pair for encryption and decryption of data
Basic auth
technology used to establish a user’s request to access a server
Bit
smallest unit of data measurement on a computer
Brute force attack
the trial and error process of discovering private information
Cipher
algorithm that encrypts information
Cryptographic key
mechanism that decrypts ciphertext
Cryptography
process of transforming information into a form that unintended readers can’t understand
Data custodian
Anyone or anything that’s responsible for the safe handling, transport, and storage of information
Data owner
person that decides who can access, edit, use, or destroy their information
Digital certificate
a file that verifies the identity of a public key holder
Encryption
process of converting data from a readable format to an encoded format
Hash collision
instance when different inputs produce the same hash value
Hash table
data structure that’s used to store and reference hash values
Hash function
algorithm that produces a code that can’t be decrypted
Identity and access management (IAM)
collection of processes and technologies that helps organizations manage digital identities in their environment
Information privacy
protection of unauthorized access and distribution of data
Multi-factor authentication (MFA)
A security measure that requires a user to verify their identity in two or more ways to access a system or network
Non-repudiation
concept that the authenticity of information can’t be denied
OAuth
open-standard authorization protocol that shares designated access between applications
Payment Card Industry Data Security Standards (PCI DSS)
set of security standards formed by major organizations in the financial industry
Personally identifiable information (PII)
Any information used to infer an individual’s identity
Principle of least privilege
concept of granting only the minimal access and authorization required to complete a task or function
Protected health information (PHI)
Information that relates to the past, present, or future physical or mental health or condition of an individual
Public key infrastructure (PKI)
encryption framework that secures the exchange of online information
Rainbow table
file of pre-generated hash values and their associated plaintext
Salting
additional safeguard that’s used to strengthen hash functions
Security assessment
check to determine how resilient current security implementations are against treats