Section 2 - ISC2 Flashcards
Confidentiality, Integrity and Availability are referred to as
the CIA Triad
PII Stands for
PHI Stands for
Personal Identifiable Information
Protected Health Information
What is the measure of the importance assigned to information by its owner
Sensitivity
What term is Availability typically associated with
Criticality
What is the process called of verifying or providing the users identification is know as
Authentication
Name 3 Common methods of Authentication
Something you know - passwords or phrases (Knowledge Base)
Something you have - Token, cards (Token-Base)
Something you are - Biometrics (Characteristics Base)
True or False - Best practice is to use all 3 of the common methods of communication
False - 2 at least two is recommended
Name the legal term as defined as the protection against an individual falsely denying having performed a particular action
Non-repudiation
Name 3 Risk Management Terminology and their definitions
Asset - something that needs protection
Vulnerability - is a gap or weakness
Threat - something or someone that aims to exploit a vulnerability
Name Threat Actors
Insiders
Outside Individuals
Formal Entities
Nation States
Technology such as bots
Threat Vector is
the approach and technique
The magnitude of the harm that can be expected and can result in a chain reaction is called
Impact
Name the 4 Risk Treatments
Avoidance - exit the service due to high risks
Acceptance - risk averse or low likelihood
Mitigation - Most common taking steps to minimize
Transfer - insurance for eg
Name the 3 Security Controls
Physical Controls
Administrator Controls
Technical Controls (logical controls)
What is the detailed steps to complete a task that supports departmental or organizational policies
Procedure
Used by governance teams to provide a framework to introduce policies and procedures in support of regulations
Standard
Put in place by organizational governance such as executive management to provide guidance
Policies
in form of laws typically from government and can carry financial penalties
Regulations
Name the Code of Ethics Cannons
Protect Society, the common good, necessary public trust and confidence in the infrastructure
Act honorably, honestly, justly, responsibility and legally
Provide diligent and competent services to principles
Advance and protect the profession
The process and act of converting the message from plaintext to ciphertext sometimes referred to as enciphering
Encyrption
The process of how an organization is managed, usually includes all aspects of how decisions are made for that organization, such as policies, roles and procedures
Governance
Define Likelihood of Occurrence
based on a weighted factor on subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability
What Department is NIST part of?
US Dept. of Commerce
Qualitative Risk vs Quantitative Risk Analysis
Qualitative - assignment based on low, medium and high
Quantitative - numerical values are assigned to both impact and likelihood based on stats and monetized