Chapter 2 - IS Governance and Risk Management Flashcards
What are the 3 components that make up the AIC triad?
Availability, integrity, and confidentiality.
This type of protection ensures reliability and timely access to data and resources to authorized individuals.
Availability
What is upheld when the assurance of the accuracy and reliability of information and systems is provided and any unauthorized modification is prevented?
Integrity
Strict access controls, intrusion detection, and hashing can combat what types of threats?
Attackers (through a logic bomb, virus, or back door) or mistakes by users compromising the integrity of data.
What ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure?
Confidentiality
What should prevail when data resides on systems and devices within the network, as it is transmitted, and once it reaches its destination?
Confidentiality
What is shoulder surfing?
When a person looks over another person’s shoulder and watches their keystrokes or views data as it appears on a computer screen.
What is social engineering?
When one person tricks another person into sharing confidential information.
Clustering, load balancing, and a fail-over configuration are examples of which component of the AIC triad?
Availability
Hashing, Change Control, Access Control, and software digital signing are examples of which component of the AIC triad?
Integrity
Encryption for data at rest, encryption for data in transit, and access control are examples of which component of the AIC triad?
Confidentiality
What is a lack of a countermeasure or a weakness in a countermeasure that is in place?
A vulnerability
What is a threat?
Any potential danger that is associated with the exploitation of a vulnerability.
What is the entity that takes advantage of a vulnerability referred to?
Threat agent
What is risk?
The likelihood of a threat agent exploiting a vulnerability and the corresponding business impact.
What is exposure?
An instance of being exposed to losses.
What is a countermeasure that is put into place to mitigate (reduce) the potential risk?
A control.
Control can also be referred to as what 2 other terms?
Countermeasure and safeguard.
A threat agent gives rise to what?
A threat.
A threat exploits what?
A vulnerability.
A vulnerability leads to what?
Risk
Risk can damage what?
An asset.
Assets cause what?
Exposure
Exposure can be countermeasure by what?
A safeguard.
A safeguard directly affects what?
A threat agent.
What 3 main flavors do control come in?
1) Administrative
2) Technical
3) Physical