Chapter 1 Vocabulary Flashcards
Integrity
Consistency, accuracy, and validity of data or information.
Availability
A resource being accessible to a user, application, or computer system when required (Accidental, Natural Disasters, Deliberate, etc.)
Risk Management
Process of identifying, assessing, and prioritizing threats and risk.
Risk
Probability that an event will occur.
Threat
Action or occurrence that could result in breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities.
Risk Assessment
Used to identify risks that may impact an environment.
Risk Avoidance
The process of eliminating a risk by choosing not to engage in an action or activity.
Risk Acceptance
The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk.
Risk Mitigation
Taking steps to reduce likelihood or impact of risk.
Risk Transfer
Taking steps to move responsibility for a risk to a third party through insurance or outsourcing.
Principle of Least Privilege
Security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform a function or job.
Attack Surface
Consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage.
Social engineering
Methods used to gain access to data systems, or networks, primarily through misrepresentation.
Access Control
Restricting access to a resource to only permitted users, applications, or computer systems.
Defense in Depth
Using multiple one layers of security to defend one’s assets.