Security, Risk Management, Privacy Flashcards
1
Q
first step when identifying IT security
A
classify data as:
confidential (limited to certain groups)
private (only certain individuals)
public
2
Q
important balance
A
security vs ease of use
3
Q
CIA triad
A
- confidentiality
- availability
- integrity
4
Q
types of attacks
A
- phishing
- ransomware
- malware
- DOS
- website attacks
- physical theft
- social engineering
- cyber warfare
- remote access attack
5
Q
types of phishing
A
phishing (general) spear phishing (targeted)
6
Q
script kiddies
A
unskilled attacker who uses programs developed by others
7
Q
NIST
A
National Institute of Standards and Technology
8
Q
steps of the NIST framework
A
- system characterization
- threat identification
- vulnerability identification
- control analysis
- likelihood determination
- impact analysis
- risk determination
- control recommendations
9
Q
key to security
A
use a multi-layered approach
10
Q
examples of security layers
A
- law
- policies
- user training
- firewalls
- monitoring
- email filtering
- Intrusion Detection Systems
- antivirus/malware software
- physical controls
11
Q
plan when things go wrong?
A
Business Continuity Planning
12
Q
plan when things go really wrong?
A
Disaster REcovery plan