Chapter 1 Flashcards

1
Q

Confidentiality

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disclosure

A

The exposure of sensitive information to unauthorized individuals, also known as data loss. This is a violation of Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alteration

A

The unauthorized modification of information, and is a violation of Integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial

A

The unintended disruption of an authorized user’s legitimate access to information. This violates the principle of Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Financial Risk

A

The risk of monetary damage to the organization as the result of a data breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reputational Risk

A

The risk of negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strategic Risk

A

The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operational Risk

A

The risk to the organization’s ability to carry out its day-to-day functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compliance Risk

A

The risk that when a security breach causes an organization to run afoul of legal or regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Controls

A

Enforce confidentiality, integrity, and availability in the digital space. Examples: firewall rules, access control lists, intrusion prevention systems, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operational Controls

A

The processes that we put in place to manage technology in a secure manner. Examples: access reviews, log monitoring, and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Managerial Controls

A

Procedural mechanisms that focus on the mechanics of the risk management process. Examples: periodic risk assessments, security planning exercises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preventive Controls

A

To stop a security issue before it occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detective Controls

A

To identify security evens that have already occurred.

17
Q

Corrective Controls

A

remediate security issues that have already occurred.

18
Q

Physical Controls

A

Security controls that impact the physical world. Examples: fences, perimeter lighting, locks, alarms.

19
Q

Compensating Controls

A

Designed to mitigate the risk associated with exceptions made to a security policy.

20
Q

Data At Rest

A

Data that resides on hard drives, tapes, in the cloud, or on other storage media.

21
Q

Data In Motion

A

Data that is in transit over a network.

22
Q

Data In Processing

A

Data that is actively in use by a computer system.

23
Q

DLP (Data Loss Prevention)

A

Systems that help organizations enforce information handling policies and procedures to prevent data loss and theft.

24
Q

Pattern Matching

A

DLP mechanism that watches for telltale signs of sensitive information. Examples: a number that is formatted like a Social Security number.

25
Q

Watermarking

A

Systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags.

26
Q

Data Minimization

A

A technique that seeks to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.

27
Q

Hashing

A

A function that transforms a value in a dataset to a corresponding has value.

28
Q

Tokenization

A

Replaces sensitive values with a unique identifier using a lookup table.

29
Q

Masking

A

Partially redacts sensitive information by replacing some or all sensitive fields with blank characters.