Domain 1: Security and Risk Management Flashcards
Audit/Auditing
The tools, processes, and activities used to perform compliance reviews.
Availability
Ensuring timely and reliable access to and use of information by authorized users
Usability, Accessibility, Timeliness
sy. 7
Business Continuity(BC)
Actions, processes, and tools for ensuring an organization can continue critical operations during a contingency.
the Business …Continues
Business impact analysis(BIA)
An analysis that identifies the resources that are critical to an organization’s ongoing viability and the threats posed to those resources. It also
assesses the likelihood that each threat will actually occur and the impact those occurrences
will have on the business. Aka business impact analysis (BIA).
Compliance
Adherence to a mandate; both the actions demonstrating adherence and the tools, processes, and documentation that are used in adherence.
Confidentiality
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
sy. 5
What is meant to be secret, stays secret
Data subject
The individual human related to a set of personal data.
The subject of the data
Disaster recovery(DR)
Those tasks and activities required to bring an organization back from contingency operations and reinstate regular operations.
Due care
A legal concept pertaining to the duty owed by a provider to a customer.
practicing the individual activities that maintain the due diligence effort.
Due diligence
Actions taken by a vendor to demonstrate/provide due care.
establishing a plan, policy, and process to protect the interests of an organization.
Governance
The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles. and procedures the organization uses to make those decisions.
Governance committee
A formal body of personnel who determine how decisions will be made within the organization and the entity that can approve changes and exceptions to current relevant governance.
Guidelines
Suggested practices and expectations of activity to best accomplish tasks and attain goals.
Integrity
Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
Reliability and correctness
sy. 5
Intellectual Property
Intangible assets (notably, includes software and data).
Maximum allowable downtime(MAD)
The measure of how long an organization can survive an interruption of critical functions. [also known as maximum tolerable downtime(MTD)]
our maximum allowable destruction
Personally Identifiable information (PII)
Any data about a human being that could be used to identify that person.
Policy
Documents published and promulgated by senior management dictating and describing the organization’s strategic goals.
Less Granular, Intention towards security
Privacy
The right of human individual to control the distribution of information about themselves.
Procedures
Explicit, repeatable activities to accomplish a specific task. Procedures can address one-time or infrequent actions or common, regular occurrences.
Recovery time objective (RTO)
The target time set for recovering from any interruption
Residual Risk
The risk remaining after security controls have been put in place as a means of risk mitigation.
Risk that remains
Risk
The possibility of damage or harm and the likelihood that damage or harm will be realized.
Risk Acceptance
Determining that the potential benefits of a business function outweigh the possible risk impact/likelihood and performing that business function with no other action.