Chapter 1: Cybersecurity Governance Flashcards

1
Q

Objectives of security

A

Provide confidentiality, integrity, availability, authenticity, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

keep unauthorized entities (people or processes) from gaining access to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

keep an asset free from unauthorized alterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

ensure reliable and timely access to assets for authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authenticity

A

ensure we can trust that something comes from its claimed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nonrepudiation

A

someone cannot disavow being the source of a given action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

a weakness in a system which allows a threat source to compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

threat

A

any potential danger associated with exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threat source

A

threat agent or threat actor; any entity which can exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk

A

likelihood of a threat source exploiting a vulnerability and corresponding business impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control

A

countermeasure; put into place to mitigate (reduce) potential risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

security governance

A

a framework which provides oversight, accountability, and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISMS

A

information security management system; a collection of policies, procedures, baselines, and standards for an org to ensure that security efforts are aligned with business needs, streamlined, and effective and no security controls are missing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enterprise security architecture

A

Implements an info security strategy and consists of layers of solutions, processes, and procedures and how they are linked across an enterprise strategically, tactically, and operationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Enterprise security architecture core features

A

strategic alignment, business enablement, process enhancement, and security effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security governance

A

framework which supports the creation and communication of security goals to consistently apply and assess them

17
Q

Senior management

A

always carries the ultimate responsibility for the org; support needed for necessary attention, funds, resources, and enforcement capabilities

18
Q

Security policy

A

a statement by management dictating the role security plays in the org; intended to be strategic

19
Q

Standards

A

documents that describe specific requirements that are compulsory in nature and support the org’s security policies; describe mandatory activities, actions, or rules

20
Q

baseline

A

minimum level of security

21
Q

Guidelines

A

recommendations and general approaches that provide advice and flexibility; recommended but optional practices

22
Q

Procedures

A

detailed step-by-step tasks that should be performed to achieve a certain goal; describes the manner in which something must be done

23
Q

Job rotation and mandatory vacations

A

administrative security controls to help detect fraud

24
Q

Separation of duties

A

ensures no single person has total control over a critical activity or task; admin control to ensure that fraud cannot happen successfully unless collusion occurs

25
Q

Split knowledge and dual control

A

two variations of separation of duties; admin preventative controls

26
Q

Social engineering

A

an attack carried out to manipulate a person into providing sensitive data to an unauthorized individual

27
Q

Security awareness training

A

comprehensive, tailored for specific groups, and organization-wide

28
Q

Gamification

A

the application of elements of game play to other activities such as security awareness training

29
Q

Security champions

A

members of an org who aren’t in security but inform and encourage the adoption of security practices within their own teams

30
Q

Professional ethics

A

codify the right ways for a group of people to behave