Chapter 1 Vocabulary Flashcards

1
Q

Integrity

A

Consistency, accuracy, and validity of data or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability

A

A resource being accessible to a user, application, or computer system when required (Accidental, Natural Disasters, Deliberate, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Management

A

Process of identifying, assessing, and prioritizing threats and risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

Probability that an event will occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

Action or occurrence that could result in breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Assessment

A

Used to identify risks that may impact an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Avoidance

A

The process of eliminating a risk by choosing not to engage in an action or activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Acceptance

A

The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Mitigation

A

Taking steps to reduce likelihood or impact of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Transfer

A

Taking steps to move responsibility for a risk to a third party through insurance or outsourcing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Principle of Least Privilege

A

Security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform a function or job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack Surface

A

Consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering

A

Methods used to gain access to data systems, or networks, primarily through misrepresentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access Control

A

Restricting access to a resource to only permitted users, applications, or computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defense in Depth

A

Using multiple one layers of security to defend one’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile Devices

A

Laptops, PDAs, and smartphones are used to process information; send and receive mail, store enormous amounts of data, surf the Internet, and interact remotely with interns, networks and systems.

17
Q

Removable Devices

A

Storage device that is designed to be taken out if a computer without turning the computer off.

18
Q

Flash Drive

A

Small drive based on a flash memory.

19
Q

Keylogger

A

Physical or logical device used to capture keystrokes.

20
Q

Confidentiality

A

Characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems (Public, Confidential, Strictly Confidential / Privileged, Unclassified, Restricted, etc.)