Module 2 Flashcards

1
Q

Security Controls

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of security controls

A

Technical

Operational

Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Privacy

A

The protection of unauthorized access and distribution of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Principle of least privilege

A

The concept of granting only the minimal access and authorization required to complete a task or function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Owner

A

The person that decides who can access, edit, use, or destroy their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Custodian

A

Anyone or anything thats responsible for the safe handling, transport, and storage of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Personably Identifiable Information (PII)

A

Any information that can be used to infer an individuals identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography

A

The process of transforming information into a form that unintended readers cant understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algorithm

A

A set of rules used that solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cipher

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic Key

A

A mechanism that decrypts ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute Force Attack

A

A trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public Key Infrastructure (PKI)

A

An encryption framework that secures the exchange of information online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric Encryption

A

The use of a public and private key pair for encryption and decryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric Encryption

A

The use of a single secret key to exchange information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PKI Process

A

Exchange of encrypted information

Establish trust using a system of digital certificates