Chapter 1 Flashcards

1
Q

Adequate Security

A

Security equivalent with the risk and magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Controls

A

Controls implemented through policy and procedures. Examples include: access control processes and requiring multiple personnel to conduct specific operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Artificial Intelligence

A

Ability of computers and robots to simulate human intelligence and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

Anything of value owned by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Access control process validating identity being claimed by a user/entity is known to the system by comparing one (single factor) or more (multifactor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Right or permission that is granted to a system entity to access a system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

Ensuring timely and reliable access to and use of information by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baseline

A

lowest level of security configuration allowed by a standard or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric

A

biological characteristics of an individual, such as fingerprint, hand geometry, voice, iris patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot

A

malicious code acting like a remote controlled robot for an attacker with trojan/worm capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

characteristic of data/information when not made availability or disclosed to unauthorized persons/processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Criticality

A

measure of degree to which an organization depends on the information/system for success of mission/business function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Integrity

A

property that data has not been altered in an unauthorized manner- covers data in storage, during processing, and while in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

process and act of converting message from plaintext to ciphertex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

General Data Protection Regulation (GDPR)

A

European Union passed this to address personal privacy, deeming it an individual human right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Institute of Electrical and Electronic Engineers

A

Professional organization that sets standards for telecommunications, computer engineering and similar disciplines

17
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

Most important healthcare information regulation in the US. Protects the privacy of individual health information and electronic healthcare transactions.

18
Q

International Organization of Standards (ISO)

A

ISO develops voluntary international standards in collaboration with partners in international standardization, International Electro-technical Commission, and International Telecommunication Union

19
Q

Internet Engineering Task Force (IETF)

A

Internet standards organization that defines protocol standards through a process of collaboration and consensus

20
Q

Likelihood

A

Probability potential vulnerability may be exercised

21
Q

Multi-factor Authentication

A

Using 2 or more distinct instances of the three factors of authentication (something you know, something you have, something you are) for identity verification

22
Q

National Institute of Standards and Technology

A

part of US Dept of Commerce, sets standards in several areas

23
Q

Non-repudiation

A

Inability to deny taking an action such as creating information. approving information and sending or receiving a message, cannot deny the validity of the action taken because of their signature

24
Q

Physical controls

A

Controls implemented through a tangible mechanism

25
Q

Qualitative Risk Analysis

A

method for risk analysis- based on Low, Medium or High

26
Q

Quantitative Risk Analysis

A

method for risk analysis- numerical values are assigned to both impact and likelihood

27
Q

Risk acceptance

A

determining potential benefits of a business function outweigh possible risk

28
Q

Risk avoidance

A

Determining the impact and/or likelihood of specific risk is too great to be offset by potential benefits and not performing a certain business function because of that determination

29
Q

Risk Management Framework

A

structured approach to oversee and manage risk for an enterprise

30
Q

Risk tolerance

A

level of risk an entity is willing to assume to achieve a potential desired result

31
Q

Risk transference

A

paying external party to accept financial impact of a given risk

32
Q

System integrity

A

Quality a system has when it performs intended function in an unimpaired manner, free from unauthorized manipulation of a system, whether intentional or accidental

33
Q

Threat vector

A

Means by which a threat actor carries out their objectives