Course 002 Glossary Flashcards
Define Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
Define Asset
An item perceived as having value to an organization
Define Attack vectors
The pathways attackers use to penetrate security defenses
Define Authentication
The process of verifying who someone is
Define Authorization
The concept of granting access to specific resources in a system
Define Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization
Define Availability
The idea that data is accessible to those who are authorized to access it
Define Biometrics
The unique physical characteristics that can be used to verify a person’s identity
Define Business continuity
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
Define Categorize
The second step of the NIST RMF that is used to develop risk management processes and tasks
Define Chronicle
A cloud-native tool designed to retain, analyze, and search data
Define Confidentiality
The idea that only authorized users can access specific assets or data
Define Confidentiality, Integrity, Availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
Define Detect
A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections
Define Encryption
The process of converting data from a readable format to an encoded format
Define External threat
Anything outside the organization that has the potential to harm organizational assets
Define Identify
A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets
Define Implement
The fourth step of the NIST RMF that means to implement security and privacy plans for an organization
Define Incident response
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach
Define Integrity
The idea that the data is correct, authentic, and reliable