Module 2 - 02-1 Flashcards
More about frameworks and controls
Define Security frameworks
Guidelines used for building plans to help mitigate risks and threats to data and privacy
What is the biggest threat to security?
People
Define Security Controls
Safeguards designed to reduce specific security risks
What are three common types of controls?
1) Encryption
2) Authentication
3) Authorization
Define Encryption
The process of converting data from a readable format to an encoded format
Encryption involves converting data from plaintext to ____
ciphertext
Define Ciphertext
The raw, encoded message that’s unreadable to humans and computers
Ciphertext data cannot be read until it’s been decrypted into its original plaintext form.
Encryption is used to ensure _____ of sensitive data
confidentiality
Define Authentication
The process of verifying who someone or something is
What is an example of an advanced method of authentication?
Multi-Factor Authentication (MFA)
What does MFA stand for?
Multi-Factor Authentication
What is an example of an MFA?
A security code or biometrics, such as a fingerprint, voice, or face scan
Define Biometrics
Unique physical characteristics that can be used to verify a person’s identity
What are examples of biometrics (3)?
A fingerprint, an eye scan, or a palm scan.
What is one example of a social engineering attack that can exploit biometrics?
Vishing