Domain 1: SECURITY PRINCIPLES Flashcards

1
Q

Data integrity

A

Property that has not been altered in an unauthorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

The process and act of converting the message from its plain text to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

General data protection regulation

A

In 2016 the European Union passed comprehensive legislation that addresses personal privacy deeming it an individual human right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Governance

A

The process of how an organization is managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Health insurance portability and accountability act or HIPAA

A

This US federal law is the most important Healthcare information regulation in the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impact

A

The magnitude of harm that could be caused by a threats exercise of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information security risk

A

The potential adverse effects to an organization’s operations including Mission functions image and reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

The property of information whereby it is recorded used and maintained in a way that ensures it’s completely accuracy internal consistency and usefulness for a stated purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

International organization of standards or ISO

A

The iso develops voluntary International standards in collaboration with its Partners in international standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet engineering task force ietf

A

The internet standards organization made up of network designers operators vendors and researchers that defines protocol standards through a process of collaboration and consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Likelihood

A

The probability that a potential vulnerability may be exercised within the construct of the associated threat environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood of occurrence

A

A weighted Factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-factor Authentication

A

Using two or more distinct instances of the three factors of authentication something you know something you have something you are for identity verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

National Institutes of standards and technology or nist

A

The nist is part of the US Department of Commerce and addresses the measurement infrastructure within Science and Technology efforts in the US federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Non repudiation

A

The inability to deny taking an action such as creating information approving information and sending or receiving a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Personally identifiable information

A

The National Institute of Standards and Technology nist defines personally identifiable information pii as any data that can distinguish or trace an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Physical controls

A

Controls implemented through tangible mechanism examples include walls fences guards locks Etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Privacy

A

The right of an individual to control the distribution of information about themselves

19
Q

Probability

A

The chances or likelihood that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities

20
Q

Protected health information or Phi

A

Information regarding health status the provision of healthcare or payment for healthcare as defined in HIPAA

21
Q

Qualitative risk analysis

A

A method for risk analysis that is based on the assignment of a descriptor such as low medium or high

22
Q

Quantitative risk analysis

A

A method for risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities and monetaryized valuation of loss or gain

23
Q

, risk

A

A measure of the extent to which any entity is threatened by a potential circumstance or event

24
Q

Risk acceptance

A

Determining that the potential benefits of a business function outweigh the possible risk or impact and Performing that business function with no other action

25
Q

Risk assessment

A

The process of identifying and analyzing risks to organizational operations including Mission functions image or reputation the analysis performed as part of risk management which incorporates threat and vulnerability analysis

26
Q

Risk avoidance

A

Determining that the impact and or likelihood of a specific risk is too great to be offset by the potential benefits and not performing a certain business function because of that determination

27
Q

Risk management

A

The process of identifying evaluating and controlling threats including all the phases of risk context or frame risk assessment risk treatment and risk monitoring

28
Q

Risk management framework

A

A structured approach used to oversee and manage risk for an Enterprise

29
Q

Risk mitigation

A

Putting security controls in place to reduce the possible impact and or likelihood of a specific risk

30
Q

Risk tolerance

A

The level of risk and entities willing to assume in order to achieve a potential desired result

31
Q

Risk transference

A

Paying an external party to accept the financial impact of a given risk

32
Q

Risk treatment

A

The determination of the best way to address and identified risk

33
Q

Security controls

A

The management operational and Technical controls prescribed for an information system to protect the confidentiality integrity and availability of the system and its information

34
Q

Sensitivity

A

A measure of the importance assigned to information by its owner for the purpose of denoting its need for protection

35
Q

Single Factor Authentication

A

Use of just one of the three available factors something you know something you have something you are to carry out the authentication process being requested

36
Q

State

A

The condition and entity is in at a point of time

37
Q

System integrity

A

The quality that a system has when it performs its intended function in an unimpaired manner free from unauthorized manipulation of the system whether intentional or accidental

38
Q

Technical controls

A

Security controls IE safeguards or countermeasures for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware software or firmware components of the system

39
Q

Threat

A

Any circumstance or event with the potential to adversely impact organizational operations including Mission functions image or reputational

40
Q

Threat actor

A

An individual or group that attempts to exploit vulnerabilities to cause or force a threat to occur

41
Q

Threat Vector

A

The means by which a threat actor carries out their objectives

42
Q

Token

A

A physical object a user possesses and controls that is used to authenticate the user’s identity

43
Q

Vulnerability

A

Weakness in an information system system security procedures internal controls or implementation that could be exploited by a threat source

44
Q

Institute of electrical and electronics engineers

A

IEEE is a professional organization that sets standards for telecommunications Computer Engineering and similar disciplines