Domain 1 Security Principles Flashcards
- Confidentiality
Confidentiality means
permitting authorized access to information while at the same time protecting it from improper disclosure
- Integrity
Integrity is the property of information whereby it is
recorded, used, and maintained in a way that ensures its completeness, accuracy, internal consistency, and usefulness for a
stated purpose
- Availability
Availability means that systems and data are accessible at the time users need them
- GDPR
These laws, including national- and state-
level laws, dictate that any entity anywhere
in the world handling the private data of
people in a particular legal jurisdiction
must abide by its privacy requirements.
Privacy
Privacy is the right of an
individual to control the
distribution of information
about themselves
- How do companies that offer identity theft insurance manage their own financial risk?
By calculating premium payments against potential payouts
- What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?
Personally Identifiable Information (PII)
- In the United States, which act governs the privacy of medical information?
Health Insurance Portability and Accountability Act (HIPPA)
- Asset
is something in need of protection
- Vulnerability
is a gap or weakness in those protection efforts
- Threat
is something or someone that aims to exploit a vulnerability to thwart protection efforts.
- Who is responsible for determining risk tolerance in an organization?
Executive management and board of directors
- Vulnerability
Is a gap or weakness in an organization’s protection of its valuable assets including information.
- Threat
Is someone or something that aims to exploit a vulnerability to gain unauthorized access.
- What role might security professionals play in risk assessment at a system level?
- Who is responsible for identifying risks within an organization?
Employees at all levels of the organization
- Security Controls
Security controls pertain to the physical, technical, and administrative mechanisms
that act as safeguards or countermeasures to protect the confidentiality, integrity, and availability of the system and its information.
- Physical Controls
Physical controls address security needs using physical hardware devices, such as badge readers, architectural features of
buildings and facilities, and specific security actions taken by staff
- Technical Controls
Technical controls (also called logical controls) are security controls that
computer systems and networks directly implement.
- Administrative Controls
Administrative controls (also known as managerial controls) are directives,
guidelines, or advisories aimed at the people within the organization. They
provide frameworks, constraints, and
standards for human behavior and should cover the entire scope of the
organization’s activities and its interactions with external parties and stakeholders.
- What is an example of a physical control?
Walls, fences, guards, locks
- According to the code of ethics, what are information security professionals expected to uphold?
Be honorable, honest, just and responsible within legal conduct
- Authentication
Authentication is a process to prove the identity of the requestor.