Information Governance and Risk Management Flashcards

1
Q

Availability

A

Reliable and timely access to data and resources is provided to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Necessary level of secrecy is enforced and unauthorized disclosure is prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shoulder Surfing

A

Viewing information in an unauthorized manner by looking over the shoulder of someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering

A

Gaining unauthorized access by tricking someone into divulging sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the triad of security?

A

C.I.A. - Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

Weakness or a lack of a countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Agent

A

Entity that can exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

The danger of a threat agent exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk

A

The probability of a threat agent exploiting a vulnerability and the associated impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control

A

Safeguard that is put in place to reduce risk, also called a countermeasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exposure

A

Presence of a vulnerability, which exposes the organization to a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main categories/types of security controls?

A

Administrative, Technical (or Logical) and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different functionalities of security controls?

A

Preventative, Detective, Corrective, Deterrent, Recovery and Compensating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deterrent Control

A

Discourage a potential attacker.

Intended to discourage a potential attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Preventative Control

A

Stop an incident from occurring.

Intended to avoid an incident from occurring

17
Q

Corrective Control

A

Fix items after an incident has occurred.

Fixes components or systems after an incident has occurred.

18
Q

Recovery Control

A

Restore necessary components to return to normal operations.

Intended to bring the environment back to regular operations.

19
Q

Detective Control

A

Identify an incidents activities after it took place.

Helps identify an incidents activities and potentially an intruder

20
Q

Compensating Control

A

Alternative control they provides similar protection as the original control.

Controls that provide an alternative measure of control.

21
Q

Vulnerability

A

Weakness or a lack of a countermeasure

22
Q

Defense-In-Depth

A

Implementation of multiple controls so that successful penetration and compromise is more difficult to attain.