Cyber Security Chapter 1

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards
Confidentiality, Integrity and Availability
What is CIA?
2
New cards
CIA (Confidentiality, integrity and Availability)
Describe security using relevant and meaningful words that make security more understandable to management and users and define its purpose
3
New cards
Confidentiality
Permitting authorized access to information while protecting information
4
New cards
Personally identifiable Information
What is PII?
5
New cards
Personally Identifiable Information (PII)
Data about an individual that could be used to identify them (Name, physical appearance, SSN, parents name, etc)
6
New cards
Protected health information
What is PHI?
7
New cards
Protected health information (PHI)
data regarding one’s health status (Health care)
8
New cards
Classified or sensitive information
Trade secrets, research, business plans and intellectual property
9
New cards
Sensitivity
Measure of importance assigned to information
10
New cards
Property of information that is recorded, used and maintained that ensures its completeness, accuracy, internal consistency, and usefulness
What is Integrity ?
11
New cards
Integrity
What is the Critical component in ensuring that systems, processes, organizations, and individuals are trustworthy, reliable, and accountable for their actions
12
New cards
Data integrity
Assurance that data has not been altered by an unauthorized user. Covers data in storage, during processing and while in transit.
13
New cards
System integrity
State of a system where it maintains a known good configuration and expected operational function as it processes information
14
New cards
System State Awareness
understanding of the current state of a system or its data at a specific point in time. It involves the process of documenting and analyzing the current state of a system or its components in order to ensure system integrity. This is essential for effective system management and security as it enables timely detection of changes or deviations from the expected state.
15
New cards
State
Condition an entity is in at a point in time
16
New cards
Baseline
refer to the current state of the information or reference point
17
New cards
Accessibility of systems and data on demand
What is Availability ?
18
New cards
Availability
Ability of authorized users to access data and information services in a timely and reliable manner, as needed and in the required format
19
New cards
Criticality
Measure of the degree to which an organization depends on the information
20
New cards
High availability levels
Critical systems must have ______ to ensure that authorized users can access the information they need to perform their roles effectively
21
New cards
Authentication
process of verifying or proving the user’s identification via SFA or MFA
22
New cards
Knowledge, Token, Characteristics
Common techniques for authentication
23
New cards
Passwords, UserID, paraphrases
Examples of Knowledge authentication
24
New cards
Tokens, memory card, smart cards
Examples of Token Authentication
25
New cards
Use of physical objects to validate users
What is Token Authentication
26
New cards
Biometrics, measurable characteristics
Examples of Characteristics authentication
27
New cards
Non-repudiation
Legal term and is defined as protection against individuals falsely denying a particular action
28
New cards
Privacy
Right of an individual to control the distribution of information about themselves
29
New cards
Risk Management
Process of identifying, evaluating and controlling threats including all phases of risk context/frame, risk assessment, risk treatment, and risk monitoring
30
New cards
Risk
Measure of the extent to which an entity is threatened by a potential event
31
New cards
Result and chance of occurrence
Risk is often express as a combination of ______
32
New cards
Information security risk
The potential adverse impacts that result from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information
33
New cards
Vulnerability
Gap or weakness in an organization’s protection of assets
34
New cards
Threat
Something or someone that aims to exploit a vulnerability to gain unauthorized access
35
New cards
Threat actor
An individual attempt to exploit vulnerability
36
New cards
Insider, Outside individuals, formal entities that are political and non political, Technology (Bots and AI)
Examples of Threat actors
37
New cards
Threat vector
Means by which a threat actor carries out their objective
38
New cards
Asset
something in need of protection
39
New cards
Likelihood
Probability that a potential vulnerability may be exercised within the construct of the associated threat environment
40
New cards
Likelihood of occurrence
measure of how likely it is for a particular threat to take advantage of a vulnerability
41
New cards
Impact
magnitude of harm that can be **expected to result** from the **consequences** of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability
42
New cards
Risk assessment
process of identifying, estimating and prioritizing risks to an organization’s operations (including its mission, functions, image and reputation), assets, individuals, other organizations and even the nation
43
New cards
Risk; Clearly
Risk identification takeaways (Identify ___ to communicate it ________)
44
New cards
All Levels
Risk identification takeaways (Employees at _____ of the organization are responsible for identifying risk)
45
New cards
protect
Risk Identification takeaways (Identify risk to ___ against it)
46
New cards
Risk Treatment
Relates to making decisions about the best actions to take regarding the identified and prioritized risk
47
New cards
Avoidance
Decision to attempt to **eliminate** the risk entirely
48
New cards
Acceptance
**No action** to reduce the likelihood of a risk occurring
49
New cards
Mitigation
Common type, taking action to prevent or **reduce** possibility of a risk event or its impact
50
New cards
Transfer
Practice of **passing** the risk to another party, insurance policy
51
New cards
Qualitative and Quantitative
Two types of Risk priorities
52
New cards
Qualitative Risk priority
Method for risk analysis that is based on descriptor such as low, medium or high (Impact)
53
New cards
Quantitative Risk priority
Numerical values are assigned to both impact and probability (Probability)
54
New cards
Risk tolerance
level of risk an entity is willing to assume in order to achieve potential results
55
New cards
Senior management
usually the starting point for getting management to take action
56
New cards
Executive management or Board of Directors
Determines what is acceptable level of risk
57
New cards
Security professionals
Maintains the level of risk within management’s limit of risk tolerance
58
New cards
Security controls
pertain to physical, technical, and administrative mechanisms that act as safeguards or countermeasures prescribe for an information system to protect confidentiality
59
New cards
Physical, Technical, and Administrative
What are the three types of security controls
60
New cards
reduce risk
Implementation of control should ____ to an acceptable level
61
New cards
Physical control
Implemented through a **tangible** mechanism
62
New cards
Technical/logical control
Security controls for an information system that is implemented by **computer systems and networks**
63
New cards
Administrative/Managerial control
Implemented through **policy** and **procedures**
64
New cards
entire scope
Administrative/Managerial control cover the ____ of the organization and its activities with external parties and stakeholders
65
New cards
information security
Administrative/Managerial control is a vital tool for achieving _____
66
New cards
leaders and management
Implement the systems and structures that the organization will use to achieve its goals, they are guided by laws and regulations created by governments to enact public policy
67
New cards
guide the development of standards, which cultivate policies, which result in procedures.
What is Laws and regulations?
68
New cards
Health Insurance Portability and Accountability act (HIPAA)
Governs the use of protected health information (PHI) in the United States
69
New cards
General Data protection regulation (GDPR)
EU comprehensive legislation that addresses personal privacy, deeming it an individual human right
70
New cards
Multinational organizations
are subject to regulations in more than one nation in addition to multiple regions and municipalities.
71
New cards
national, regional, local
Organizations need to consider the regulations that apply to their business at all levels—______—and ensure they are compliant with the most restrictive regulation.
72
New cards
HIPAA, GDPR, Multinational organizations
Examples of Laws and Regulation
73
New cards
detailed steps to complete a task that support departmental or organizational policies.
What is Procedures?
74
New cards
measurement criteria and methods
Procedures establish the _______ to use to determine whether a task has been successfully completed
75
New cards
maximum organizational benefits
Properly documenting procedures and training personnel on how to locate and follow them is necessary for deriving the ________ from procedures
76
New cards
put in place by organizational governance, such as executive management, to provide guidance in all activities to ensure that the organization supports industry standards and regulations.
What is Policies?
77
New cards
Governance policies
Used to moderate and control decision-making, to ensure compliance when necessary and to guide the creation and implementation of other policies
78
New cards
Senior executive
High level governance policies - used by ____ to shape and control decision-making processes
79
New cards
used by governance teams to provide a framework to introduce policies and procedures in support of regulations.
What is Standards?
80
New cards
International Organization for Standardization (ISO)
develops and publishes international standards on a variety of technical subjects, including information systems and information security, as well as encryption standards.
81
New cards
National Institute of Standards and Technology (NIST)
United States government agency under the Department of Commerce and publishes a variety of technical standards in addition to information technology and information security standards
82
New cards
NIST
recommended standards by industries worldwide
83
New cards
Internet Engineering Task Force (IETF)
standards in communication protocols that ensure all computers can connect with each other across borders, even when the operators do not speak the same language
84
New cards
Institute of Electrical and Electronics Engineers (IEEE)
Standards for telecommunications, computer engineering and similar disciplines.
85
New cards
Regulations
commonly issued in the form of laws, usually from government (not to be confused with governance) and typically carry financial penalties for noncompliance.
86
New cards
Policies
____ the highest-level governance documents in an organization, usually approved and issued by management, usually to support a compliance initiative.
87
New cards
Procedure
A security practitioner who needs step-by-step instructions to complete a provisioning task might use a ___ to ensure they are performing the task in a consistent manner.
88
New cards
Standards
Frameworks, or __________ are often offered by third-party organizations and cover specific advisory or compliance objectives.
89
New cards
Laws or Regulations
Usually mandated by a government agency, __ are a set of rules that everyone must comply with and usually carry monetary penalties for noncompliance.
90
New cards
Law
The Healthcare Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal _____ in the United States that requires certain actions be taken to protect health information
91
New cards
Standards
Many organizations use published frameworks, or _______
92
New cards
Policies 
to guide the organizational ____ that support the compliance effort.
93
New cards
Procedures 
Many departments or workgroups within the organization implement _________ that detail how they complete day-to-day tasks while remaining compliant.
94
New cards
Preamble
The ____states the purpose and intent of the ISC2 Code of Ethics.
95
New cards
Safety and welfare of society and the common good
The ______________, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
96
New cards
* The safety and welfare of society and the common good, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
* Therefore, strict adherence to this Code is a condition of certification.

ISC2 Code of Ethics Preamble
97
New cards
* Protect society, the common good, necessary public trust and confidence, and the infrastructure.
* Act honorably, honestly, justly, responsibly and legally. =
* Provide diligent and competent service to principals.
* Advance and protect the profession.

ISC2 Code of Ethics Canon
98
New cards
Canons
The ________ represent the important beliefs held in common by the members of ISC2.
99
New cards
Society
Protect ______, the common good, necessary public trust and confidence, and the infrastructure
100
New cards
Honorably
Act ___, honestly, justly, responsibly and legally