CISSP ch 2 Flashcards
IAM
identity and access management
Provision the account and assign necessary privileges and access
AUP
acceptable use policy
UBA
User behavior analytics
UEBA
User and entity behavior analytics
VMS
Vendor management system
Software that assists with the management and procurement of staffing services, hardware, software, and other needed products and services
PCI DSS
Payment card industry data security standard
FERPA
Family educational rights and privacy act
AV
Asset value
EF
exposure factor
Risk
Possibility that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result
Threat x vulnerability
Probability of harm x severity of harm
Attack
Intentional attempt to exploit a vulnerability to cause damage, loss or disclosure of assets
Breach
Successful attack
Intrusion, penetration
ACS
Annual cost of safeguard
SCA
security control assessment
Formal evaluation of a security infrastructure’s individual mechanisms against a baseline or reliability expectation
ERM
enterprise risk management