Domain 1: SECURITY PRINCIPLES Flashcards
Data integrity
Property that has not been altered in an unauthorized manner
Encryption
The process and act of converting the message from its plain text to ciphertext
General data protection regulation
In 2016 the European Union passed comprehensive legislation that addresses personal privacy deeming it an individual human right
Governance
The process of how an organization is managed
Health insurance portability and accountability act or HIPAA
This US federal law is the most important Healthcare information regulation in the United States
Impact
The magnitude of harm that could be caused by a threats exercise of a vulnerability
Information security risk
The potential adverse effects to an organization’s operations including Mission functions image and reputation
Integrity
The property of information whereby it is recorded used and maintained in a way that ensures it’s completely accuracy internal consistency and usefulness for a stated purpose
International organization of standards or ISO
The iso develops voluntary International standards in collaboration with its Partners in international standardization
Internet engineering task force ietf
The internet standards organization made up of network designers operators vendors and researchers that defines protocol standards through a process of collaboration and consensus
Likelihood
The probability that a potential vulnerability may be exercised within the construct of the associated threat environment
Likelihood of occurrence
A weighted Factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities
Multi-factor Authentication
Using two or more distinct instances of the three factors of authentication something you know something you have something you are for identity verification
National Institutes of standards and technology or nist
The nist is part of the US Department of Commerce and addresses the measurement infrastructure within Science and Technology efforts in the US federal government
Non repudiation
The inability to deny taking an action such as creating information approving information and sending or receiving a message
Personally identifiable information
The National Institute of Standards and Technology nist defines personally identifiable information pii as any data that can distinguish or trace an individual’s identity
Physical controls
Controls implemented through tangible mechanism examples include walls fences guards locks Etc