CompTIA Security+ Flashcards
study
Confidentiality
Ensures that unauthorized individuals are not able to gain access to sensitive information.
Integrity
ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.
Availability
ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.
Nonrepudiation
while not part of the CIA triad, is also an important goal of some cybersecurity controls. ________ means that someone who performed some action, such as sending a message, cannot later deny having taken that action.
Security incidents
occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
Disclosure
is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.
Alteration
is the unauthorized modification of information and is a violation of the principle of integrity.
Denial
is the disruption of an authorized user’s legitimate access to information.
Financial risk
is, as the name implies, the risk of monetary damage to the organization as the result of a data breach.
Reputational risk
occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.
Strategic risk
is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
Operational risk
is risk to the organization’s ability to carry out its day-to-day functions.
Compliance risk
occurs when a security breach causes an organization to run afoul of legal or regulatory requirements. F
Gap Analysis
the cybersecurity professional reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives. If there are any cases where the controls do not meet the control objective, that is an example of a ___.
Technical controls
enforce confidentiality, integrity, and availability in the digital space. Examples of ________ security controls include firewall rules, access control lists, intrusion prevention systems, and encryption.
Operational controls
include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management.
Managerial controls
are procedural mechanisms that focus on the mechanics of the risk management process. Examples of administrative ______ controls include periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices.