Glossary terms from module 2 Flashcards

1
Q

What is an Asset?

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Attack vectors?

A

The pathways attackers use to penetrate security defences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Authentication?

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Authorization?

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by Availability?

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Biometrics?

A

The unique physical characteristics that can be used to verify a person’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Confidentiality?

A

The idea that only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the model that helps inform how organizations consider risk when setting up systems and security policies

A

Confidentiality, integrity, availability.
The CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the NIST core function related to: identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST core functions

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Encryption?

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which NIST core function is related to management of cybersecurity risk and its effect on an organization’s people and assets

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the idea that the data is correct, authentic, and reliable?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is NIST CSF?

A

National Institute of Standards and Technology-Cybersecurity Framework

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is NIST Special Publication (S.P.) 800-53?

A

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53: A unified framework for protecting the security of information systems within the U.S. federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is OWASP?

A

Open Web Application Security Project/Open Worldwide Application Security Project
A non-profit organization focused on improving software security

17
Q

Which NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats

A

Protect

18
Q

Which NIST core function relates to returning affected systems back to normal operation

A

Recover

19
Q

Which NIST core function is related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

A

Respond

20
Q

What is the term for: anything that can impact the confidentiality, integrity, or availability of an asset

A

Risk

21
Q

What is the term for: A review of an organization’s security controls, policies, and procedures against a set of expectations

A

Security audit

22
Q

What are Security controls?

A

Safeguards designed to reduce specific security risks

23
Q

What are security frameworks?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

24
Q

What is: An organization’s ability to manage its defence of critical assets and data and react to change

A

Security posture

25
Q

Any circumstance or event that can negatively impact assets is known as …?

A

Threat

26
Q
A