Information Security Governance Flashcards
Core Goals of Security
CIA
Availability
Integrity
Confidentiality
Vulnerability
Weakness or lack of countermeasure
Threat agent
Entity that can exploit a vulnerability
Threat
The danger of a threat agent exploiting a vulnerability
Risk
The probability of a threat agent exploiting a vulnerability and the associated impact
Control
Safeguard that is put in place to reduce risk, also called a countermeasure
Exposure
Presence of a vulnerability, which exposes the organization to a threat
Availability
Reliable and timely data access to authorized individuals
Integrity
Accuracy and reliability of the information
Confidentiality
Necessary level of secrecy is enforced
Deterrent Control Function
Intended to discourage a potential attacker
Preventative Control Function
Intended to avoid an incident from occurring
Corrective Control Function
Fixes components or systems after an incident has occurred
Recovery Control Function
Intended to bring the environment back to regular operations
Detective Control Function
Helps identify an incident’s activities and potentially an intruder