Foundations: Module 3 Flashcards
Asset
Something valuable to a company.
Availability
Making sure data is there when it’s needed.
Compliance
Following rules and laws.
Confidentiality
Only certain people can see the data.
Confidentiality, Integrity, Availability (CIA) Triad
A model that helps inform how organizations consider risk when setting up systems and security policies.
Hacktivist
Someone who hacks to support a political cause.
Health Insurance Portability and Accountability Act (HIPAA)
A law that protects people’s health information.
Integrity
Making sure data is correct and hasn’t been changed.
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
A helpful guide with rules and tips to manage cybersecurity risks.
Privacy Protection
Protecting personal info so only the right people can use it.
Protected Health Information (PHI)
Health info about someone’s body or mind, from the past, present, or future.
Security Architecture
A setup of tools and plans used to keep a company safe from cyber threats.
Security Controls
Steps or tools used to lower certain security risks.
Security Ethics
Rules to help security professionals make the right choices.
Security Frameworks
Plans that help protect data and privacy by reducing risks.
Security Governance
Ways a company organizes and guides its security work.
Sensitive Personally Identifiable Information (SPII)
A kind of personal info, like a Social Security number, that needs extra protection.
What is a real-world example of a threat in cybersecurity?
A hacker group tries to trick a bank with phishing to cause damage on purpose.
What is a real-world example of a vulnerability in cybersecurity?
Using a weak password without extra protection makes it easier for hackers to break in.
What is a real-world example of a risk in cybersecurity?
A fake email fools an employee into clicking a bad link, letting hackers steal important data.