Chapter 1 Flashcards
What an example of a privacy law in Europe that dictates how data belonging to European citizens is handled?
GPDR -General Data Protection Regulation
Define Privacy
the right of an individual to control the distribution of information about themselves
How do you protect data that is entrusted to you as a Cyber Security Analyst
By using the CIA Triad
What is a vulnerability
an inherent weakness or flaw in a system or component which, if triggered or acted upon could cause a risk event to occur.
What is a threat
Something or someone that aims to exploit a vulnerability in order to gain unauthrorized access.
Define Authentication
Access control process that compares one or more factors of identification to validate the identity of someone trying to authenticate
Define authorization
The right or a permission that is granted to a system entity to access a system or resource
Define Confidentiality
Characteristic of data or info when it is not made available or disclosed to unauthorized people.
Define Privacy
The right of an individual to control the distribution of information about themselves.
Define an asset
something in need of protection
What is risk
The intersection of threats, vulnerabiliites and assets.
define a threat vector
Approach and technique used by a threat actor
Define the likelihood of occurrence
is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.
Define impact as it relates to risk management
the magnitude of harm that can be expected to result from the consequences of a comprised CIA.
What are three strategies for identifying risk.
Identify risk to communicate it clearly.
Employees at all levels of the organization are responsible for identifying risk.
Identify risk to protect against it.