Chapter 1: Today's Security Professionals

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

The three key objectives of cybersecurity program?

1 / 41

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

42 Terms

1

The three key objectives of cybersecurity program?

Confidentiality, Integrity, Availability

New cards
2

Confidentiality

ensures that unauthorized individuals are not able to gain access to sensitive information

New cards
3

integrity

ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally

New cards
4

Availability

ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them

New cards
5

CIA Triad

The industry standard for computer security since the development of the mainframe. The standard is based on three characteristics that describe the utility of information: confidentiality, integrity, and availability.

New cards
6

Security Incidents

When an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

New cards
7

DAD Triad

Disclosure, Alteration, and Denial

New cards
8

DAD Triad; Disclosure

Exposure of sensitive information to unauthorized individuals. This is also known as data loss.

New cards
9

DAD Triad; Alteration

unauthorized modification of information

New cards
10

DAD Triad; Denial

Disruption of an authorized user's legitimate access to information.

A DDoS attack is an example of this. causing servers/websites to fail so that users cannot access them.

New cards
11

financial risk

The risk of monetary damage to the organization as the result of a data breach.

New cards
12

Reputational Risk

Negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers and other stakeholders.

New cards
13

Strategic Risk

organization will become less effective in meeting its major goals and objectives as a result of a breach

New cards
14

Operational Risk

Risk to the organization's ability to carry out its day-to-day functions

New cards
15

Compliance Risk

security breach causes an organization to run afoul of legal or regulatory requirements

New cards
16

Security Controls

Specific measures that fulfill the security objectives of an organization

New cards
17

Security Control Objectives

Technical, Operational, Managerial

New cards
18

Technical Controls

The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system.

New cards
19

Operational controls

The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by people (as opposed to systems).

New cards
20

Managerial controls

procedural mechanisms that focus on the mechanics of the risk management process.

New cards
21

Security Control Types

Preventative, Detective, Corrective, Deterrent, Compensating, Physical

New cards
22

Preventive controls

controls that deter problems before they arise

New cards
23

Detective Controls

Security controls that attempt to detect security incidents after they have occurred.

New cards
24

Corrective Controls

controls that identify and correct problems as well as correct and recover from the resulting errors

New cards
25

Deterrent Controls

Security controls that attempt to discourage individuals from causing a security incident.

New cards
26

Physical Controls

Security controls that you can physically touch.

New cards
27

Compensating Controls

control procedures that compensate for the deficiency in other controls

New cards
28

Payment Card Industry Data Security Standard

A set of security standards that all U.S. companies processing, storing, or transmitting credit card information must follow.

New cards
29

Data at rest

Data that is stored.

New cards
30

Data in motion

Data that is moving over a WAN or LAN, a wireless network, over the internet, or in other ways

New cards
31

data in processing

actively in use by a computer system

New cards
32

Data Loss Prevention (DLP)

Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data

New cards
33

Host-based DLP

uses software agents installed on systems that search those systems for the presence of sensitive information. detecting that information allows the organization to take action to either remove or secure the data. Can also monitor system configuration and user actions, blocking undesirable actions.

New cards
34

Network-based DLP

dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information.

New cards
35

pattern matching

telltale signs of sensitive information

New cards
36

Watermarking

apply electronic tags to sensitive documents

New cards
37

Data minimization

seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis

New cards
38

Data Obfuscation

The process that transforms data into a format where the original information can't be retrieved.

New cards
39

Hashing

transforming plaintext of any length into a short code called a hash.

New cards
40

Tokenization

The process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.

New cards
41

Masking

partially redacts sensitive information by replacing some or all sensitive fields with blank characters

New cards
42

Rainbow Table Attack

attempts to discover the password from the hash using databases of precomputed hashes; countermeasure is salting

New cards

Explore top notes

note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 664 people
Updated ... ago
4.2 Stars(5)
note Note
studied byStudied by 46 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 38 people
Updated ... ago
4.3 Stars(3)

Explore top flashcards

flashcards Flashcard257 terms
studied byStudied by 48 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard114 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 49 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard90 terms
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard79 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)