Domain 1 Flashcards

Security Principles

You may prefer our related Brainscape-certified flashcards:
1
Q

Adequate Security

A

proper level of security that is equivalent to the level of risk potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Controls

A

controls implemented through policy & procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Artificial Intelligence

A

ability of human intelligence/behavior to be replicated by computer/robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

anything of value owned by an organization & needs protection (e.g. laptop with sensitive data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

act of identifying/verifying eligibility to access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

right/permission granted to an entity to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

principle of the CIA triad that sets the standard that data will be accessible/usable in a timely/reliable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Baseline

A

documented lowest-level of security configuration allowed by a standard &/or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometric

A

biological characteristics of individual. “something you are”. (e.g. fingerprint, iris scan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bot

A

malicious code that can be controlled remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classified/Sensitive Information

A

protected information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

principle of the CIA triad that sets the standard that data is not made available/disclosed to unauthorized people or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Criticality

A

degree of importance/necessity of information &/or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Integrity

A

property that data has not been altered in an unauthorized manner (in storage, processing, &/or transit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

converting plaintext to ciphertext. “enciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR

A

General Data Protection Regulation. EU legislation passed in 2016 that defines personal privacy as an individual human right regardless of nationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Governance

A

process of how an organization is managed & aspects of how decisions are made (including policies, roles, & procedures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HIPAA

A

Health Insurance Portability & Accountability Act. National standards of electronic healthcare transactions while protecting PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Impact

A

magnitude of harm that could be caused by a threat exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Security Risk

A

potential adverse impacts to an organization’s operations, assets, individuals, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Integrity

A

principle of the CIA triad that sets the standard that information maintained in a way that ensures completeness, accuracy, internal consistency, & usefulness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISO

A

International Organization of Standards. Sets voluntary international standards with the IEC & ITU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IETF

A

Internet Engineering Task Force. Internet standards organization that defines protocol standards through collaboration

23
Q

Likelihood

A

probability of a threat using a vulnerability

24
Q

Likelihood of Occurrence

A

weighted probability of a threat using a vulnerability based on subjective analysis

25
Q

Multi-Factor Authentication

A

utilization of two (or more) distinct instances for identity verification (“something you know”, “something you have”, “something you are”)

26
Q

NIST

A

National Institutes of Standards & Technology. Part of the US Department of Commerce. Sets standards in IS within the Computer Security Resource Center of the Computer Security Divisions

27
Q

Non-Repudiation

A

inability to deny taking direction/action (i.e. logs are used to ensure non-repudiation)

28
Q

PII

A

Personally Identifiable Information. Any data that can distinguish/trace an individual’s identity

29
Q

Physical Controls

A

controls implemented through a tangible mechanism (e.g. walls, fences, guards, locks, etc)

30
Q

Privacy

A

right of an individual to control the distribution of information about themselves

31
Q

Probability

A

likelihood that threat will/can exploit a vulnerability

32
Q

PHI

A

Protected Health Information. PII that relates to health. (Covered by HIPAA)

33
Q

Qualitative Risk Analysis

A

method for risk analysis that is based on the assignment of descriptor (low, medium, high)

34
Q

Quantitative Risk Analysis

A

method for risk analysis where numerical values are assigned both impact & likelihood based on statistical probabilities & monetarized evaluation of loss/gain

35
Q

Risk

A

measure of the extent to which an entity is threatened by potential circumstance or event

36
Q

Risk Acceptance

A

potential benefits of business function outweighs the risk

37
Q

Risk Assessment

A

process of identifying/analyzing risks to organization. Part of Risk Management

38
Q

Risk Avoidance

A

potential impact/likelihood of risk outweighs benefits

39
Q

Risk Management

A

process of identifying, evaluating, and controlling threats (risk context/frame, assessment, treatment, monitoring)

40
Q

Risk Management Framework

A

structured approach used to oversee and manage risk for an enterprise

41
Q

Risk Mitigation

A

putting security controls to reduce possible risk

42
Q

Risk Tolerance

A

level of risk that is acceptable for desired result

43
Q

Risk Transferance

A

paying external party to accept financial impact

44
Q

Risk Treatment

A

determination of best way to address identified risk

45
Q

Security Controls

A

parameters implemented to protect various forms of data and infrastructure important to an organization. includes management, operation, and technical controls

46
Q

Sensitivity

A

measure of the importance assigned to information by its owner

47
Q

Single-Factor Authentication

A

use of 1/3 available factors for authentication (“something you know”, “something you have”, “something you are”)

48
Q

State

A

condition an entity is in at any point in time

49
Q

System Integrity

A

when systems perform its intended funtion

50
Q

Technical Controls

A

security controls (safeguards/countermeasures) for a information system that are primarily implemented and executed by IS through hardware, software/firmware

e.g firewalls

51
Q

Threat

A

circumstance/event with potential to negatively impact the organization

52
Q

Threat Actor

A

individual/group that attempts to exploit vulnerabilities

53
Q

Threat Vector

A

means by which a threat actor carries out their objectives

54
Q

Token

A

physical object a user possesses/controls used to authenticate a user’s identity (“something you have”)

55
Q

Vulnerability

A

weakness in an IS, system security procedures, internal controls, and implementation that could be exploited

56
Q

IEEE

A

Institute of Electrical & Electronics Engineers. Sets standards for telecommunications, computer engineering, and similar disciplines