Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

What does “Confidentiality” mean?

Ensures that sensitive data is only accessible to authorized people, systems, or processes.

2
New cards

What is the purpose of Confidentiality?

To prevent unauthorized access—stopping unauthorized users from seeing, stealing, or altering private information.

3
New cards

How is Confidentiality maintained?

Through encryption, access controls, passwords, and data masking.

4
New cards

Give examples of Confidentiality measures.

  • Encryption (protects files or emails)

  • Access Control (restricts sensitive data)

  • Data Masking (hides sensitive parts)

  • Two-Factor Authentication

  • NDAs (Non-Disclosure Agreements)

5
New cards

What does “Integrity” ensure?

That information remains accurate, unaltered, and protected from unauthorized modification.

6
New cards

What is the purpose of Integrity?

Protection from tampering or unauthorized data alteration.

7
New cards

What methods verify Integrity?

Checksums, Secure Hash Algorithms, and digital signatures.

8
New cards

Give examples of Integrity measures.

  • Digital signatures on emails

  • Database access control

  • Checksums verifying software downloads

9
New cards

What does “Availability” ensure?

That systems, data, and resources are accessible to authorized users whenever needed.

10
New cards

What is the purpose of Availability?

Minimizing downtime and ensuring continuous access to resources.

11
New cards

What strategies ensure Availability?

Backup, redundancy, and failover systems.

12
New cards

What is Authentication?

The process of verifying the identity of a user, device, or system before granting access.

13
New cards

What are examples of Authentication?

asswords, biometrics (fingerprint, face scan), or security tokens.

14
New cards

What is Authorization?

Determining what a verified user is allowed to do (access rights, actions, services).

15
New cards

When does Authorization occur?

After authentication.

16
New cards

Who is the Controller in data privacy?

The entity that determines the purpose and means of processing personal data.

17
New cards

What is the first step in Risk Management?

Risk Identification — finding potential threats that could impact the organization.

18
New cards

What is the second step in Risk Management?

Risk Assessment — evaluating likelihood and impact of each identified risk.

19
New cards

What is Risk Analysis?

Evaluating identified risks to determine their potential impact and likelihood.

20
New cards

What are the two main risk analysis methods?

Qualitative and Quantitative.

21
New cards

Describe Qualitative Risk Analysis.

Uses subjective judgment (low, medium, high) based on expertise and brainstorming.

22
New cards

What is “Likelihood”?

The probability a risk will occur (likely, unlikely).

23
New cards

What is “Impact”?

The magnitude of damage caused by a risk (financial, reputational, operational).

24
New cards

What is “Risk Tolerance”?

The acceptable level of risk an organization is willing to take.

25
New cards

What are the four main risk treatment strategies?

Transfer, Accept, Avoid, and Mitigate.

26
New cards

What is Risk Transfer?

Shifting risk to a third party (e.g., insurance, outsourcing).

27
New cards

What is Risk Acceptance?

Acknowledging a risk without acting because it’s low-impact or low-probability.

28
New cards

What is Risk Mitigation?

Reducing likelihood or impact via controls (e.g., firewalls, anti-malware).

29
New cards

What is Risk Reporting?

Documenting and communicating risks, their status, and mitigation efforts to stakeholders.

30
New cards

Why is Risk Reporting important?

It helps decision-makers prioritize resources and actions for effective risk management.

31
New cards

What is Automating how does it relate to Third Party Risk Management?

Using technology to carry out tasks automatically without requiring human intervention.

32
New cards

Give an example of Automation

Using AI like machine learning to perform complex tasks that require human intelligence.

33
New cards

Types of Controls

Preventive, Detterent, Detective, Corrective, Compensating and Directive

34
New cards

What is incident response

Incident response is a structured approach to addressing and managing the aftermath of a cybersecurity incident

35
New cards

What is the definition of policies

Formal, high-level statements that define an organizations approach to security and set expectation for behavior and compliance

36
New cards

What is sthe purose of policies?

 Establish clear rules and responsibilities to protect assets, ensure regulatory compliance and mitigate risk

37
New cards

What is the definition of guidelines?

High-level recommendations that outline best practices and frameworks to follow for achieving security objectives

38
New cards

What is the purpose of guidelines?

Offer direction on how policies and procedures should be implemented to maintain consistent security practices across the organization

39
New cards

What is the definition of procedures?

Step by step isntructions for carrying out specific task to comply with standards and policies

40
New cards

What are standards

Detailed mandatory rules specifying uniform methods to enforce policies

41
New cards

What is Inherent risk

The risk before controls are in place

42
New cards

What is Residual risk

The remaining risk after controls are applied

43
New cards

What is ISO 27001

Internation standard for building an information security management system. Focuses on policies and risk treatments.

44
New cards

What is SOC 2

Auditing standard. Evaluates controls over secuirty, availability, integrity and confidentiality.