Domain 1 Flashcards

Security Principles

1
Q

Adequate Security

A

proper level of security that is equivalent to the level of risk potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Controls

A

controls implemented through policy & procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Artificial Intelligence

A

ability of human intelligence/behavior to be replicated by computer/robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

anything of value owned by an organization & needs protection (e.g. laptop with sensitive data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

act of identifying/verifying eligibility to access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

right/permission granted to an entity to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

principle of the CIA triad that sets the standard that data will be accessible/usable in a timely/reliable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Baseline

A

documented lowest-level of security configuration allowed by a standard &/or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometric

A

biological characteristics of individual. “something you are”. (e.g. fingerprint, iris scan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bot

A

malicious code that can be controlled remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classified/Sensitive Information

A

protected information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

principle of the CIA triad that sets the standard that data is not made available/disclosed to unauthorized people or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Criticality

A

degree of importance/necessity of information &/or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Integrity

A

property that data has not been altered in an unauthorized manner (in storage, processing, &/or transit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

converting plaintext to ciphertext. “enciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR

A

General Data Protection Regulation. EU legislation passed in 2016 that defines personal privacy as an individual human right regardless of nationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Governance

A

process of how an organization is managed & aspects of how decisions are made (including policies, roles, & procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HIPAA

A

Health Insurance Portability & Accountability Act. National standards of electronic healthcare transactions while protecting PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Impact

A

magnitude of harm that could be caused by a threat exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Security Risk

A

potential adverse impacts to an organization’s operations, assets, individuals, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Integrity

A

principle of the CIA triad that sets the standard that information maintained in a way that ensures completeness, accuracy, internal consistency, & usefulness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISO

A

International Organization of Standards. Sets voluntary international standards with the IEC & ITU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IETF

A

Internet Engineering Task Force. Internet standards organization that defines protocol standards through collaboration

23
Q

Likelihood

A

probability of a threat using a vulnerability

24
Likelihood of Occurrence
weighted probability of a threat using a vulnerability based on subjective analysis
25
Multi-Factor Authentication
utilization of two (or more) distinct instances for identity verification ("something you know", "something you have", "something you are")
26
NIST
National Institutes of Standards & Technology. Part of the US Department of Commerce. Sets standards in IS within the Computer Security Resource Center of the Computer Security Divisions
27
Non-Repudiation
inability to deny taking direction/action (i.e. logs are used to ensure non-repudiation)
28
PII
Personally Identifiable Information. Any data that can distinguish/trace an individual's identity
29
Physical Controls
controls implemented through a tangible mechanism (e.g. walls, fences, guards, locks, etc)
30
Privacy
right of an individual to control the distribution of information about themselves
31
Probability
likelihood that threat will/can exploit a vulnerability
32
PHI
Protected Health Information. PII that relates to health. (Covered by HIPAA)
33
Qualitative Risk Analysis
method for risk analysis that is based on the assignment of descriptor (low, medium, high)
34
Quantitative Risk Analysis
method for risk analysis where numerical values are assigned both impact & likelihood based on statistical probabilities & monetarized evaluation of loss/gain
35
Risk
measure of the extent to which an entity is threatened by potential circumstance or event
36
Risk Acceptance
potential benefits of business function outweighs the risk
37
Risk Assessment
process of identifying/analyzing risks to organization. Part of Risk Management
38
Risk Avoidance
potential impact/likelihood of risk outweighs benefits
39
Risk Management
process of identifying, evaluating, and controlling threats (risk context/frame, assessment, treatment, monitoring)
40
Risk Management Framework
structured approach used to oversee and manage risk for an enterprise
41
Risk Mitigation
putting security controls to reduce possible risk
42
Risk Tolerance
level of risk that is acceptable for desired result
43
Risk Transferance
paying external party to accept financial impact
44
Risk Treatment
determination of best way to address identified risk
45
Security Controls
parameters implemented to protect various forms of data and infrastructure important to an organization. includes management, operation, and technical controls
46
Sensitivity
measure of the importance assigned to information by its owner
47
Single-Factor Authentication
use of 1/3 available factors for authentication ("something you know", "something you have", "something you are")
48
State
condition an entity is in at any point in time
49
System Integrity
when systems perform its intended funtion
50
Technical Controls
security controls (safeguards/countermeasures) for a information system that are primarily implemented and executed by IS through hardware, software/firmware | e.g firewalls
51
Threat
circumstance/event with potential to negatively impact the organization
52
Threat Actor
individual/group that attempts to exploit vulnerabilities
53
Threat Vector
means by which a threat actor carries out their objectives
54
Token
physical object a user possesses/controls used to authenticate a user's identity ("something you have")
55
Vulnerability
weakness in an IS, system security procedures, internal controls, and implementation that could be exploited
56
IEEE
Institute of Electrical & Electronics Engineers. Sets standards for telecommunications, computer engineering, and similar disciplines