Week 2 - Planning & Security

0.0(0)
Studied by 8 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

CTAINASL

Last updated 3:44 PM on 4/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

32 Terms

1
New cards

Comprehensive Security

Closing off all possible avenues of attack; an attacker only needs one unprotected avenue to succeed.

2
New cards

Weakest-link Failure

When the failure of a single element of a system ruins the entire security.

3
New cards

Plan-Protect-Respond Cycle

The core security management process: Planning (strategy), Protection (countermeasures), and Response (recovery).

4
New cards

Security as an Enabler

Good security allows a firm to engage in activities otherwise impossible, like interorganizational systems.

5
New cards

Positive Vision of Users

Viewing users as assets to be trained rather than "malicious or stupid" obstacles.

6
New cards

Driving Forces

Factors like the threat environment and compliance laws that necessitate security.

7
New cards

Remediation Plans

Plans developed to address security gaps for every resource unless it is well-protected.

8
New cards

Investment Portfolio

A selection of security projects chosen to provide the largest returns since all gaps cannot be closed at once.

9
New cards

CSO / CISO

Chief Security Officer or Chief Information Security Officer; the executive in charge of security.

10
New cards

In-House IT Security

Security managed by internal teams, offering direct control and alignment with IT strategy.

11
New cards

Outsourced Security (MSSP)

Using Managed Security Service Providers for expertise, though it often reduces control over policies.

12
New cards

Hybrid Model

A combination of internal and external security resources to gain flexibility and expert support.

13
New cards

Sarbanes-Oxley Act (2002)

Requires firms to report material deficiencies in financial reporting processes.

14
New cards

HIPAA

A US law governing the protection of private data in health care organizations.

15
New cards

Defense in Depth

Using multiple independent layers of security in series so the resource remains safe if one layer fails.

16
New cards

Single Point of Vulnerability

A point of failure that has drastic consequences for the entire system (e.g., a central DNS server).

17
New cards

Technical Security Architecture

The total organization of a company's technical countermeasures into a complete system.

18
New cards

Legacy Technologies

Older systems that must be upgraded if they seriously impair security and the cost is justified.

19
New cards

Reasonable Risk

The level of risk an organization accepts by balancing threat likelihood against potential impact.

20
New cards

Risk Reduction

Adopting active countermeasures, like firewalls, to lower the probability of loss.

21
New cards

Risk Acceptance

Implementing no countermeasures and absorbing damages (for low-impact risks).

22
New cards

Risk Transference

Shifting risk to another party, most commonly through insurance.

23
New cards

Risk Avoidance

Stopping an activity entirely because it is considered too risky.

24
New cards

Asset Value (AV)

The total value of the asset to be protected.

25
New cards

Exposure Factor (EF)

The percentage of an asset's value lost in a single breach.

26
New cards

Single Loss Expectancy (SLE)

The damage amount from a single breach (AV \times EF).

27
New cards

Annualized Loss Expectancy (ALE)

The average yearly loss expected (SLE \times \text{Annual Probability}).

28
New cards

Acceptable Use Policy (AUP)

Defines proper user behavior and typically requires a user's signature to minimize misuse.

29
New cards

Standards

Mandatory directives that must be followed within the organization.

30
New cards

Guidelines

Recommended actions that are not mandatory but must be considered.

31
New cards

Segregation of Duties

Requiring two or more people to complete a sensitive task to prevent individual damage.

32
New cards

Job Rotation

Moving employees between roles to uncover fraudulent schemes that require constant maintenance.