Key I-SEC Concepts Flashcards

1
Q

Access

A

A subject or object’s ability to:

-use
-manipulate
-modify

or affect another subject or object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

The organizational resource that is being protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack -

A

An act that is an intentional or unintentional attempt to cause damage, or compromise the information and/or the systems that support it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control, Safeguard, or Countermeasure

A

Security mechanisms, policies, or procedures that can successfully counter an attack(s), reduce risk, resolve vulnerabilities; improve the security within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploit

A

To take advantage of weaknesses or vulnerability in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exposure

A

A single instance of being open to damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hack

A

Good: to use computers or systems for enjoyment;
Bad: to illegally gain access to a computer or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Object

A

A passive entity in the information system that receives or contains information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Blueprint

A

The plan for the implementation of new security measures in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Model

A

A collection of specific security rules that represents the implementation of a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Posture or Security Profile

A

A general label for the combination of all policies, procedures, technologies, and programs that make up the total security effort currently in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Subject

A

An active entity that interacts with an information system andcauses information to move through the system for a specific end purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats

A

A category of objects, persons, or other entities that represents apotential danger to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Agent

A

A specific instance or component of a more general threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability

A

Weaknesses or faults in a system or protection mechanism that expose information to attack or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly