Definitions Flashcards

1
Q

Vulnerability

A

A weakness in a device, system, application or process that might allow an attack to take place. They are internal factors that can be controlled by cyber pros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

An outside force that may exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk

A

The combination of a threat and a corresponding vulnerability.

Risk = Threat x Vulnerability

Both of these factors must be present before a situation poses a risk to the security of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adversarial Threat

A

Individuals, groups, and organizations that are attempting to deliberately undermine the security of an organization. When evaluating an adversarial threat, cyber pros should consider the capability of the threat actor to engage in attacks, the intent of the threat actor, and the likelihood that the threat will target the organization. Adversarial threats can also include insider, as well as external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accidental Threat

A

These occur when individuals doing their routine work mistakenly perform an action that undermines security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Structural Threat

A

These occur when equipment, software, or environmental controls fail due to the exhaustion of resources, exceeding their operational capabilities, or simply failing due to age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Environmental Threats

A

These occur when natural or man-made disasters occur that are outside of the control of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical Controls

A

Systems, devices, software, and settings that work to enforce confidentiality, integrity, and availability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operational Controls

A

Practices and procedures that bolster cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly