Network Security Fundamentals and CIA Triad Flashcards
What is the collection of activities that protect the information system and the data stored in it?
Information Systems Security
What protects information and resources?
Information Security
What protects data, network, hardware, and software?
Network Security
What are the types of approaches to cybersecurity?
Compliance-based, Risk-based, and Ad hoc-based
Which approach to cybersecurity is standards-based and implements security controls based on a standard and uses a checklist-based attitude?
Compliance-based
Which approach to cybersecurity implements security without any rationale and may portray insufficient subject knowledge to handle security?
Ad hoc-based
Which approach to cybersecurity focuses security implementation based on one or more risks and addresses risks that may be beyond organization’s tolerance and business needs?
Risk-based
What is anything valuable to you or your organization, like data, devices, or software, that needs protection?
Asset
What is a weakness or flaw in hardware, software, or facilities that can be taken advantage of to compromise security?
Vulnerability
What is a method or tool used to take advantage of a vulnerability (program, script, or other mechanism)?
Exploit
What is anything that has the potential to cause harm to your assets, like malware, hackers, or natural disasters?
Threat
What is an action taken to harm your assets by exploiting vulnerabilities?
Attack
What is the potential or probability that a loss may occur and is focused on the potential of future events not present ones?
risk
What is the entity behind a threat called?
Threat actor
What is the method used for launching threats called?
attack vector