Chapter 5 - Describing Information Security Concepts Flashcards

1
Q

What is the concept that guarantees only authorized users can view sensitive information?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The concept that guarantees only authorized subjects can change sensitive information and may also guarantee authenticity of data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The concept that guarantees uninterrupted access by authorized users to important computing resources and data.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information that can be used on its own, or with other information to identify, contact, or locate a single person.

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any information about health status, provision of health care, or payment of health care that can be linked to a specific individual.

A

Personal Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A function of the likelihood of a given threat source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An intent and method that is targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally trigger a vulnerability.

A

Threat Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A weakness that makes a resource susceptible to a threat.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The resulting damage to the organization that is caused by a threat.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network attack in which an unauthorized person gains access to a network and stays there undetected for a long time period.

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A risk option when the cost of other risk management options may outweigh the cost of the risk itself.

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A risk option that avoids any exposure to the risk.

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A risk option where a company’s risk exposure is limited by taking some action.

A

Risk Limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A risk option where the transference of risk to a willing third party.

A

Risk Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A risk assessment approach that involves trying to map a dollar amount to each specific risk.

A

Quantitative approach

17
Q

A risk assessment approach that involves assigning a risk level, such as low, medium, or high to each risk.

A

Qualitative approach

18
Q

A defect in software or hardware, in the concept of information security.

A

Vulnerability

19
Q

The open framework for communicating and characteristics and severity of software vulnerabilities.

A

CVSS

20
Q

Access control model that secures information by assigning sensitivity labels on information and comparing it to the users operating sensitivity level.

A

Mandatory Access Control

21
Q

Access control model that uses an ACL to decide which users or groups have access to the information.

A

Discretionary Access Control

22
Q

Access control model that is based on an individual’s roles and responsibilities within the organization (RBAC).

A

Non-Discretionary Access Control

23
Q

Name the three types of Security Operations Centers

A

Threat-centric - actively looks for threats on the network
compliance-based - focuses on security posture as it relates to compliancy testing
operational-based - focuses on maintaining operational integrity and functionality

24
Q

Risk is a function of what three factors

A

Threat, Vulnerability, and Impact