Protecting Information Assets: Threats, Mitigations, and Continuity Planning

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

This set of vocabulary flashcards covers key concepts in information security, threat landscapes, defensive mitigations, and continuity planning based on the MT300 lecture materials.

Last updated 12:54 AM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Shared responsibility

The principle that protecting information assets requires coordinated action across leadership, employees, and technology owners rather than isolated technical teams.

2
New cards

Phishing

Deceptive messages used to manipulate users into revealing credentials, approving transactions, or opening malicious content.

3
New cards

Malware

Malicious software that encrypts, steals, or disrupts data and often uses persistence mechanisms to evade detection.

4
New cards

Insider misuse

When authorized users overstep permissions, misuse access, or deliberately exfiltrate sensitive information.

5
New cards

Exposure errors

Security gaps such as misconfigurations, weak sharing settings, and accidental disclosure that reveal data without a direct attack.

6
New cards

Technical drift

The expansion of an attack surface and reduction in resilience caused by delayed patching, configuration drift, and legacy systems.

7
New cards

Awareness training

Continuous, scenario-based education that helps employees recognize manipulation, verify requests, and report suspicious activity.

8
New cards

Strong authentication

The use of multi-factor authentication to reduce the value of stolen passwords and raise the cost of account takeover.

9
New cards

Least privilege

Restricting access to the minimum necessary for a user's role to limit lateral movement and contain the impact of mistakes.

10
New cards

Patch management

Prioritized vulnerability remediation to close exploitable flaws before they can be weaponized at scale by adversaries.

11
New cards

Endpoint detection (EDR)

Tools that identify suspicious behavior, isolate compromised devices, and accelerate forensic investigation.

12
New cards

Network segmentation

The practice of dividing a network to limit the lateral spread of a threat and improve detection fidelity through telemetry and alerts.

13
New cards

Governance controls

Policies, audits, and change management that ensure security decisions are documented, reviewed, and consistently enforced.

14
New cards

Ethical stewardship

Handling employee and customer data with proportionality, respect, and defensible purpose limitation.

15
New cards

Privacy by design

A framework using minimization, retention limits, and privacy-first architecture to reduce exposure while supporting lawful processing.

16
New cards

Impact analysis

Assessing mission-critical functions, downstream effects, and the business consequences of prolonged disruption.

17
New cards

Recovery targets

Defined thresholds for acceptable downtime and data loss using time and point recovery objectives.

18
New cards

Defense in depth

The use of overlapping preventive, detective, and corrective controls so that a single failure does not result in a breach.

19
New cards

Assume compromise

A design philosophy that expects some controls will fail and prepares containment and response accordingly.

20
New cards

Continuity readiness

Prepared recovery capabilities designed to preserve service delivery when disruption is unavoidable.