Domain 1: Study Essentials Flashcards
What does confidentiality seek to prevent?
Confidentiality seeks to prevent the unauthorized disclosure of information: it keeps data secret
What is the goal of integrity?
Integrity seeks to prevent unauthorized modification of information and ensure that data written in an authorized manner is complete and accurate
What does availability ensure?
Availability ensures that information is available when needed
What is an active entity in an information system called?
Subject
What is a passive data file referred to as?
Object
What does Annualized Loss Expectancy represent?
The cost of loss due to a risk over a year
What is a threat?
A potentially negative occurrence
What is a vulnerability?
A weakness in a system
What defines risk?
A matched threat and vulnerability
What is a safeguard?
A measure taken to reduce risk
What does Total Cost of Ownership refer to?
The cost of a safeguard
What is Return on Investment?
Money saved by deploying a safeguard
What are the elements of the CIA Triad?
The elements are confidentiality, integrity, and availability.
What does confidentiality mean?
Confidentiality is the principle that objects are not disclosed to unauthorized subjects.
What does integrity mean?
Integrity is the principle that objects retain their veracity and are intentionally modified only by authorized subjects.
What does availability mean?
Availability is the principle that authorized subjects are granted timely and uninterrupted access to objects.
What are the elements of AAA services?
AAA services focus on identification, authentication, authorization, auditing, and accounting.
How does identification work?
Identification is when a subject professes an identity and accounting is initiated.
What is authentication?
Authentication is the process of verifying or testing that a claimed identity is valid.
What is the role of authorization in security?
Authorization ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity.
What is the auditing process?
Auditing is the programmatic means by which subjects are held accountable for their actions while authenticated on a system.
Why is accounting important in security?
Effective accounting relies on the capability to prove a subject’s identity and track their activities.
What is abstraction in security?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
What are security boundaries?
A security boundary is the line of intersection between any two areas, subnets, or environments that have different security requirements.
What is security governance?
Security governance is the collection of practices related to supporting, defining, and directing the security efforts of an organization.
What is third-party governance?
Third-party governance is the system of external entity oversight that may be mandated by law, regulation, or contractual obligation.
What is documentation review?
Documentation review is the process of reading the exchanged materials and verifying them against standards and expectations.
How does security function align with business strategy?
Security management planning aligns the security functions to the strategy, goals, mission, and objectives of the organization.