Foundations: Module 3 Flashcards

1
Q

Asset

A

Something valuable to a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability

A

Making sure data is there when it’s needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compliance

A

Following rules and laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Only certain people can see the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality, Integrity, Availability (CIA) Triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivist

A

Someone who hacks to support a political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A law that protects people’s health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Making sure data is correct and hasn’t been changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A

A helpful guide with rules and tips to manage cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy Protection

A

Protecting personal info so only the right people can use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protected Health Information (PHI)

A

Health info about someone’s body or mind, from the past, present, or future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Architecture

A

A setup of tools and plans used to keep a company safe from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls

A

Steps or tools used to lower certain security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Ethics

A

Rules to help security professionals make the right choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Frameworks

A

Plans that help protect data and privacy by reducing risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Governance

A

Ways a company organizes and guides its security work.

17
Q

Sensitive Personally Identifiable Information (SPII)

A

A kind of personal info, like a Social Security number, that needs extra protection.

18
Q

What is a real-world example of a threat in cybersecurity?

A

A hacker group tries to trick a bank with phishing to cause damage on purpose.

19
Q

What is a real-world example of a vulnerability in cybersecurity?

A

Using a weak password without extra protection makes it easier for hackers to break in.

20
Q

What is a real-world example of a risk in cybersecurity?

A

A fake email fools an employee into clicking a bad link, letting hackers steal important data.