Information Governance and Risk Management Flashcards
Availability
Reliable and timely access to data and resources is provided to authorized individuals.
Integrity
Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented.
Confidentiality
Necessary level of secrecy is enforced and unauthorized disclosure is prevented.
Shoulder Surfing
Viewing information in an unauthorized manner by looking over the shoulder of someone else.
Social Engineering
Gaining unauthorized access by tricking someone into divulging sensitive information.
What is the triad of security?
C.I.A. - Confidentiality, Integrity, Availability
Vulnerability
Weakness or a lack of a countermeasure
Threat Agent
Entity that can exploit a vulnerability
Threat
The danger of a threat agent exploiting a vulnerability.
Risk
The probability of a threat agent exploiting a vulnerability and the associated impact.
Control
Safeguard that is put in place to reduce risk, also called a countermeasure.
Exposure
Presence of a vulnerability, which exposes the organization to a threat.
What are the main categories/types of security controls?
Administrative, Technical (or Logical) and Physical
What are the different functionalities of security controls?
Preventative, Detective, Corrective, Deterrent, Recovery and Compensating.
Deterrent Control
Discourage a potential attacker.
Intended to discourage a potential attacker