Cyber Security Terms Flashcards

1
Q

What is cybersecurity?

A

Cybersecurity is the technology, measure or
practice for preventing or mitigating
cyberattacks on systems, networks,
applications, programs, data and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the aim of cybersecurity?

A

To prevent or lessen the gravity of an
attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three security goals?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat?

A

Something with the potential to cause harm by compromising
stated security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a vulnerability?

A

Characteristics of, or weaknesses in a system that could be
used to cause harm if acted on by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a security incident?

A

An unwanted or unexpected cyber security event, or a series of
such events, that have a significant probability of compromising
business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a security attack?

A

If vulnerabilities are deliberately exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three information states?

A

In storage, In transmission and being processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the use of the term “controls” ?

A

Used to protect information assets or business goals by reducing vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three control types?

A

Preventive, Detective and Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Threat actor

A

A person or entity whose actions impact or have the potential to impact information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat action

A

What was done or intended to cause harm to the information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five things we need to understand in order to protect information assets?

A

Information about the asset, Possible threats, Existing vulnerabilities, Likelihood of threats and vulnerabilities coinciding and Potential consequences if that does happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “Vulnerabilities”

A

Characteristics of, or weaknesses in, a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the crucial pieces of information you need to understand the information asset?

A

What and where it is and what the value is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What three factors change the severity of a security incident?

A

Value and criticality of asset, degree of compromise and perspective

15
Q

What does ‘risk’ mean in information security?

A

Effect of uncertainty on objectives

16
Q

Define ‘effect of event’

A

Consequences, deviation from normal state including positive or negative

17
Q

Define ‘uncertainty’

A

How likely is it that this event will happen?

18
Q

What two terms define an ‘information security risk’?

A

Likelihood and consequences

19
Q

What two terms define a ‘consequence’

A

Magnitude and impact

20
Q
A
21
Q

How should organisations manage risk?

A

The process should be systematic and continual

22
Q

In what order are the three main components of the ‘risk management process’?

A

Risk identification, risk analysis and risk evaluation

23
Q
A