Summarize Fundamental Security Concepts Flashcards

Lesson 1

1
Q

CIA Triad

A

Three principles of security control and management. Also known as the information security triad. Also
referred to in reverse order as the AIC triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

The fundamental security goal of keeping information and communications private and protecting them from
unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

The fundamental security goal of keeping organizational information accurate, free of errors, and without
unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The fundamental security goal of ensuring that computer systems operate continuously and that authorized
persons can access data that they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

The security goal of ensuring that the party that sent a transmission or created data remains associated with that
data and cannot deny sending or creating that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Institute of Standards and Technology
(NIST)

A

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice
guides and research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersecurity frameworks (CSF).

A

Standards, best practices, and guidelines for effective security risk management. Some frameworks are general
in nature, while others are specific to industry or technology types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security controls

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality,
integrity, and availability (CIA) of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gap analysis

A

An analysis that measures the difference between the current and desired states in order to help assess the
scope of work included in a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify and access management (IAM)

A

A security process that provides identification, authentication, and authorization mechanisms for users,
computers, and other entities to work with organizational assets like networks, operating systems, and
applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identification

A

The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to
as enrollment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

A method of validating a particular entity’s or individual’s unique credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

The process of determining what rights and privileges a particular entity has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is
detected or attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly