Assets, Threats, & Vulnerabilities Flashcards
Asset
item perceived as having value to an organization
Asset inventory
catalog of assets that need to be protected
Asset classification
practice of labeling assets based on sensitivity and importance to an organization
Asset management
process of tracking assets and the risks that affect them
Compliance
process of adhering to internal standards and external regulations
Data
information that is translated, processed, or stored by a computer
Data at rest
data not currently being accessed
Data in transit
data traveling from one point to antoher
Data in use
data being accessed by one or more users
Information security (InfoSec)
practice of keeping data in all states away from unauthorized users
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Policy
set of rules that reduce risk and protect information
Procedures
step-by-step instructions to perform a specific security task
Regulations
Rules set by a government or other authority to control the way something is done
Risk
Anything that can impact confidentiality, integrity, and availability of an asset
Standards
References that inform how to set policies
Threat
Any circumstances or event that can negatively impact assets
Vulnerability
weakness that can be exploited by a threat
Access controls
security controls that manage access, authorization, and accountability of information
Algorithm
set of rules used to solve a problem
Application programming interface (API) token
small block of encrypted code that contains information about a user
Asymmetric encryption
use of public and private key pair for encryption and decryption of data
Basic auth
technology used to establish a user’s request to access a server
Bit
smallest unit of data measurement on a computer