Chapter 01 - Todays Security Professional Flashcards
What is Confidentiality
Confidentiality ensures that unauthorized individuals are not able to gain access to sensitive data.
Name 3 cyber security objectives.
CIA:
* Confidentiality
* Integrity
* Availability
Integrity
Ensures that there is no unauthorized modifications to information or systems, either intentionally or unintentionally.
What is Availability
Ensures that info and systems are rready to meet the needs of legimitate users at the time those users request it.
Name some confidentiality security controls.
- Firewalls
- Access Control Lists
- Encryption
Name some Integrity controls.
- Hashing
- Integrity Monitoring Solutions
Name some availability controls.
- Fault tolerance
- Clustering
- Backups
________ occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
Security Incidents occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
Name the DAD triad
Disclosure
Alteration
Denial
_____ model explains the three key threats to cyber security efforts.
DAD triad model explains the three key threats to cyber security efforts.
_____ is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.
Disclosure
_____ is the unauthorized modification of information and is a violation of the principle of integrity.
Alteration
_____ is the unintended disruption of an authorized users legitimate access to information.
Denial
Attackers who gain access to sensitive information and remote it from the organization are said to be performing _______.
Data exfiltration
We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk. The categories are ____, _____, _____, _____ and _____.
Financial, Reputational, Strategic, Operational, and Compliance
________ is the risk of monetary damage to the organization as the result of the data breach.
Financial
______ risk occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.
Reputational risk
________ is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
Strategic Risk
_____ is risk to the organization’s ability to carry out its day-to-day functions. This may slow down business processes, delay delivery of customer orders, or require the implementation of time-consuming manual work-arounds to normally automated practices.
Operational Risk
_____ occurs when a security breach causes an organization to run afoul of legal or regulatory requirements.
Compliance Risk
______ requires that health-care providers and other covered entities protect the confidentiality, integrity and availability of protected health information (PHI).
HIPAA