Chapter 1: Cybersecurity Governance Flashcards
Objectives of security
Provide confidentiality, integrity, availability, authenticity, and nonrepudiation
Confidentiality
keep unauthorized entities (people or processes) from gaining access to assets
Integrity
keep an asset free from unauthorized alterations
Availability
ensure reliable and timely access to assets for authorized individuals
Authenticity
ensure we can trust that something comes from its claimed source
Nonrepudiation
someone cannot disavow being the source of a given action
Vulnerability
a weakness in a system which allows a threat source to compromise security
threat
any potential danger associated with exploiting a vulnerability
threat source
threat agent or threat actor; any entity which can exploit a vulnerability
Risk
likelihood of a threat source exploiting a vulnerability and corresponding business impact
Control
countermeasure; put into place to mitigate (reduce) potential risk
security governance
a framework which provides oversight, accountability, and compliance
ISMS
information security management system; a collection of policies, procedures, baselines, and standards for an org to ensure that security efforts are aligned with business needs, streamlined, and effective and no security controls are missing
Enterprise security architecture
Implements an info security strategy and consists of layers of solutions, processes, and procedures and how they are linked across an enterprise strategically, tactically, and operationally
Enterprise security architecture core features
strategic alignment, business enablement, process enhancement, and security effectiveness