Week 1 Flashcards
This person reports directly to the chief information
officer (CIO)
Chief information security officer (CISO)
The ____ reports to the CISO and supervises technicians, administrators, and security staff.
Security manager
The ____ has both technical knowledge and managerial skills
Security administrator.
This position is generally an entry-level position for a person who has the necessary technical skills
Security technician
it is the goal to be free from danger as well as the process that achieves that freedom
Security
____ is intended to protect information that provides value to people and organizations
Information security
There are three protections that must be extended over information: ___, ___, –or CIA. -
Confidentiality, Integrity, and Availability
It is important that only approved individuals are able to access important information
Confidentiality
____ ensures that the information is correct and no unauthorized person or malicious software has altered the data
Integrity
____ ensures that data is accessible to authorized users
Availability
In addition to the CIA, another set of protections must be implemented to secure information. These are ____, ____, ____ —or AAA
authentication, authorization, and accounting
_ is defined as an item that has value
asset
A type of action that has the potential to cause harm
threat
A ____is a person or element that has the power to carry out a threat
threat agent
____ is a flaw or weakness that allows a threat agent to bypass security
vulnerability
A ____ is a situation that involves exposure to some type of danger
risk
Identifying the risk but making the decision to not engage in the activity
Risk Avoidance
____ simply means that the risk is acknowledged but no steps are taken to address it
Risk Acceptance
____ is the attempt to address the risks by making risk less serious
Risk mitigation
____ involves understanding something about the attacker and then informing him of the harm
Risk deterrence
____ is the process of shifting the responsibility for managing a risk to another party.
Risk transference
information security can be helpful in
- preventing data theft,
- thwarting identity theft,
- avoiding the legal consequences of not securing information,
- maintaining productivity, and foiling cyber terrorism.
Steps of an Attack
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives