Introduction to Cyber Security: Security Controls and Risk Management

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key concepts from the lecture on Security Controls and Risk Management in Cyber Security, helping students understand important definitions and classifications related to the topic.

Last updated 12:01 AM on 3/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Security Controls

Measures implemented to protect information and assets from threats, often categorized as physical, technical, and administrative.

2
New cards

Physical Controls

Security measures implemented to prevent unauthorized access to sensitive materials, such as surveillance cameras and locked doors.

3
New cards

Technical Controls

Controls that use technology to manage access and use of sensitive data, including encryption and access control lists.

4
New cards

Administrative Controls

Human factors of security, involving policies and procedures that govern user access and responsibility within an organization.

5
New cards

Preventive Controls

Measures designed to discourage errors or irregularities by preventing them from occurring.

6
New cards

Detective Controls

Controls that help identify errors or irregularities after they have occurred, such as monitoring systems and audits.

7
New cards

Corrective Controls

Measures taken to correct a situation after a security violation has occurred.

8
New cards

Recovery Controls

Controls used in serious situations to recover from security violations and restore information.

9
New cards

Compensating Controls

Alternative arrangements made when original controls fail or cannot be used, addressing the same threats.

10
New cards

Risk Management

The process of identifying, assessing, and reducing risks to an acceptable level in information systems.

11
New cards

Vulnerability

A weakness in a system, network, or device that can be exploited by a threat.

12
New cards

Threat

Potential danger posed by a vulnerability.

13
New cards

Risk

The likelihood of a threat exploiting a vulnerability and the associated business impact.

14
New cards

Countermeasure

A safeguard put in place to mitigate potential risks.

15
New cards

Annualized Loss Expectancy (ALE)

The expected annual loss due to a threat, calculated using Single Loss Expectancy (SLE) and Annualized Rate of Occurrence (ARO).

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)