Glossary terms from module 2 Flashcards
What is an Asset?
An item perceived as having value to an organization
What are Attack vectors?
The pathways attackers use to penetrate security defences
What is Authentication?
The process of verifying who someone is
What is Authorization?
The concept of granting access to specific resources in a system
What is meant by Availability?
The idea that data is accessible to those who are authorized to access it
What are Biometrics?
The unique physical characteristics that can be used to verify a person’s identity
What is Confidentiality?
The idea that only authorized users can access specific assets or data
What is the model that helps inform how organizations consider risk when setting up systems and security policies
Confidentiality, integrity, availability.
The CIA Triad.
What is the NIST core function related to: identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.
Detect
NIST core functions
Identify
Protect
Detect
Respond
Recover
What is Encryption?
The process of converting data from a readable format to an encoded format
Which NIST core function is related to management of cybersecurity risk and its effect on an organization’s people and assets
Identify
What is the idea that the data is correct, authentic, and reliable?
Integrity
What is NIST CSF?
National Institute of Standards and Technology-Cybersecurity Framework
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
What is NIST Special Publication (S.P.) 800-53?
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53: A unified framework for protecting the security of information systems within the U.S. federal government
What is OWASP?
Open Web Application Security Project/Open Worldwide Application Security Project
A non-profit organization focused on improving software security
Which NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats
Protect
Which NIST core function relates to returning affected systems back to normal operation
Recover
Which NIST core function is related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process
Respond
What is the term for: anything that can impact the confidentiality, integrity, or availability of an asset
Risk
What is the term for: A review of an organization’s security controls, policies, and procedures against a set of expectations
Security audit
What are Security controls?
Safeguards designed to reduce specific security risks
What are security frameworks?
Guidelines used for building plans to help mitigate risk and threats to data and privacy
What is: An organization’s ability to manage its defence of critical assets and data and react to change
Security posture
Any circumstance or event that can negatively impact assets is known as …?
Threat