Chapter 2 Flashcards
What is the core duty of cybersecurity?
to identify, mitigate and manage cyber risk to an organization’s digital assets
Types of approaches to cybersecurity implementation
Compliance-based
Risk-based
Ad hoc
Explain the compliance-based approach
this approach relies on regulations or standards to
determine security implementations
Explain the risk-based approach
relies on identifying the unique risk an organization faces and designing and implementing security controls to address that risk
Explain the ad hoc approach
an ad hoc approach simply implements security with no particular rationale or criteria
What is a risk?
The combination of the probability of an event and its consequence
Define Threat
anything that is capable of acting against an asset in a manner that can result in harm
a potential cause of an unwanted incident
Define Asset
Something of value that is worth protecting,
ex: people, information, finances
What is a vulnerability?
a weakness in the design, implementation or operation of a process that can expose the system to adverse threats
Define Residual risk
the remaining risk after management has implemented a risk response
Define Inherent risk
the risk level prior to taking action to secure assets
What are the criteria for approaching risk?
Risk Tolerance
Size of the environment
Amount of data available
Define cyberattack
a cyberattack is a well-defined, advanced, targeted attack that is stealthy
Define attack
the actual occurrence of a threat
or
an activity by a threat agent (or adversary) against an asset
Define attack vector
the path used to gain access to the target asset