ITEC 3500 (CHAT)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:13 PM on 12/7/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Risk

The estimated frequency and potential impact of future loss.

2
New cards

Annual Loss Expectancy (ALE)

Expected annual loss, calculated as Single Loss Expectancy (SLE) multiplied by Annualized Rate of Occurrence (ARO).

3
New cards

Single Loss Expectancy (SLE) [GOOD]

The dollar amount of loss from a single event if a specific threat occurs.

4
New cards

Annualized Rate of Occurrence (ARO) [GOOD]

The estimated number of times a specific threat is expected to occur within one year.

5
New cards

Risk Appetite

The amount of risk that an organization is willing to accept in pursuit of its business objectives.

6
New cards

Information Security Risk [good]

The expected loss of information confidentiality, integrity, or availability.

7
New cards

Key Risk Indicator (KRI) [Good]

Metrics used by organizations to provide an early signal of increasing risk exposures.

8
New cards

Risk Assessment vs. Risk Analysis [GOOD]

A risk assessment is a high-level evaluation of potential risks, while a risk analysis is a detailed examination at a granular level.

9
New cards

Risk Management Process

Typically involves four steps – Identify, Measure/Assess, Respond/Mitigate, and Monitor risks continuously.

10
New cards

Residual Risk [GOOD]

The remaining risk after controls or mitigations are applied.

11
New cards

Compensating Control [Good]

An alternate safeguard implemented when a primary control is infeasible, providing similar protection.

12
New cards

Preventive Control [Good]

A control that stops an incident from occurring.

13
New cards

Detective Control [GOOD]

A control that detects or alerts on a security incident in progress.

14
New cards

Corrective Control [GOOD]

A control that fixes or restores systems after an incident.

15
New cards

Defense in Depth

A security principle using multiple overlapping layers of defense.

16
New cards

Segregation of Duties [GOOD]

A control principle that divides critical tasks among multiple people to prevent fraud or error.

17
New cards

Least Privilege (Minimum Privilege)

Granting each user or system only the access and permissions needed for its function.

18
New cards

Need to Know [GOOD]

Restricting access so that information is provided only to those who require it for business functions.

19
New cards

Vulnerability [GOOD]

A weakness in a system, process, or person that can be exploited by a threat.

20
New cards

Zero-Day Vulnerability [good]

A vulnerability that is publicly known but for which no vendor patch exists.

21
New cards

CVE (Common Vulnerabilities and Exposures)

A dictionary of publicly disclosed cybersecurity vulnerabilities, each given a unique ID.

22
New cards

CVSS (Common Vulnerability Scoring System)

A standard for rating the severity of technical vulnerabilities.

23
New cards

Business Continuity Planning (BCP) [GOOD]

Planning to keep essential business functions operating during and after disruptions.

24
New cards

Disaster Recovery (DR)

The IT-focused part of BCP that deals with restoring systems and data after a major outage.

25
New cards

Business Impact Analysis (BIA) [GOOD]

A study of business processes and their dependencies to determine recovery priorities.

26
New cards

Recovery Time Objective (RTO) [GOOD]

The maximum acceptable time to restore a process after a disruption.

27
New cards

Recovery Point Objective (RPO) [Good]

The maximum acceptable data loss measured in time.

28
New cards

Maximum Tolerable Downtime (MTD) [GROUP]

The total time a business process can be unavailable without causing unacceptable harm.

29
New cards

Full Backup [good]

A complete copy of all chosen data.

30
New cards

Incremental Backup [GOOD]

Backs up only data changed since the last backup.

31
New cards

Differential Backup [GOOD]

Backs up all data changed since the last full backup.

32
New cards

Hot Site [GOOD]

A fully equipped standby data center that can take over almost immediately.

33
New cards

Warm Site

A recovery facility partially equipped with hardware that requires installation before becoming operational.

34
New cards

Cold Site

A basic space with power and connectivity but no hardware.

35
New cards

Single Sign-On (SSO)

An authentication system that allows a user to log in once to access multiple systems.

36
New cards

Kerberos

An authentication protocol that uses tickets and keys to provide SSO within a trusted domain.

37
New cards

SAML (Security Assertion Markup Language)

An XML-based protocol that enables identity federation and SSO across organizations.

38
New cards

Role-Based Access Control (RBAC)

An IBM model where users are assigned to roles reflecting job functions.

39
New cards

Threat Modeling

A structured process for identifying potential threats and vulnerabilities.

40
New cards

OCTAVE

Operationally Critical Threat, Asset, and Vulnerability Evaluation – a risk assessment methodology.

41
New cards

TARA (Threat Agent Risk Assessment)

An approach focusing on profiling threat agents by their motivations.

42
New cards

NIST Cybersecurity Framework (NIST CSF)

A voluntary framework that helps organizations manage cybersecurity risks.

43
New cards

COBIT 5

A comprehensive governance and management framework for maximizing IT value.

44
New cards

ISO/IEC 27001

An international standard for establishing and maintaining an Information Security Management System.

45
New cards

ISO/IEC 27002

A code of practice providing guidelines for implementing information security.

46
New cards

CIS Critical Security Controls

A prioritized set of cybersecurity best practices for organizations.

47
New cards

Internal Control (COSO)

A process designed to provide reasonable assurance regarding achievement of objectives.

48
New cards

Audit (ISO definition)

A systematic, independent process for evaluating compliance with specified criteria.

49
New cards

OWASP Top 10

(Web application security) A list of common critical web application risks (maintained annually by OWASP) (for context).

50
New cards

Threat Agent

Any person or entity (internal or external, deliberate or accidental) that could exploit a vulnerability.

51
New cards

Attack Scenario

A hypothetical sequence of steps an attacker might use to exploit a vulnerability.