week 9 Flashcards
disclosure
confidentiality
alteration
integrity
denial
availability
What’s Cyber Security
- The protection of information assets by addressing threats to
information processed,
Cyber Security Awareness
Cybersecurity addresses both internal and external threats to an organization
Risk :
The likelihood that something bad will happen that causes harm to an informational asset
Asset:
Something that has tangible or intangible value that is worth protecting
Vulnerability :
A weakness that could be used to endanger or cause harm to an informational asset
Threat :
A potential cause of an unwanted incident.
Residual risk:
Even after controls are in place, there will always be residual risk, defined as the remaining risk after management has implemented a risk response.
Inherent risk:
The risk level or exposure without taking into account the actions that management has taken or might take
Third party risk :
Information sharing , restricted access
Risk Management
the process of identifying vulnerabilities and
threats to information resources, and deciding what
countermeasures to take to reduce risk
Cyber Security Implementation Approaches Compliance Based :
relying on industry standards, controls are
implemented disregard their applicability.
Risk Based :
Discover risks affecting organization and then design
appropriate security controls to address the risk