Play It Safe - Manage Security Risks: Module 1 Flashcards
Assess
Check if the right security controls are working properly.
Authorize
Approve who is responsible for protecting data and privacy.
Business Continuity
A company’s ability to keep running during a crisis.
Categorize
Sort systems and data based on how important or risky they are.
External Threat
A danger from outside the organization (like hackers).
Implement
Put security and privacy plans into action.
Internal threat
A risk from someone inside the organization (like an employee or vendor).
Monitor
Watch how systems are working to catch problems early.
Prepare
Get ready by putting plans in place before an attack happens.
Ransomware
A cyberattack where data is locked and money is demanded to unlock it.
Risk
Anything that could harm data’s safety, accuracy, or availability.
Risk Mitigation
Steps taken to reduce the impact of a possible threat.
Security Posture
How strong a company is at protecting its important data and systems.
Select
Choose and document security tools and actions for protection.
Shared Responsibility
Everyone in an organization helps keep data and systems safe.
Social Engineering
Tricking people into giving away private info or access.
Vulnerability
A weakness in a system that attackers can use to cause harm.