CompTIA Security+ — Security Program Management and Oversight

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/136

flashcard set

Earn XP

Description and Tags

A non-exhaustive list of relevant terminology for the CompTIA Security+ SY0-701 exam, as of August 2025.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

137 Terms

1
New cards

Acceptable Use Policy (AUP)

A policy type that defines how an employee or other entity can use a company’s network, system, or device.

2
New cards

Information Security Policy (ISP)

A policy type that provides a broad overview of how organizations secure information and data, which may involve high-level policies about credential policies, facility policies, change management, onboarding and offboarding, and encryption.

3
New cards

Business Continuity (BC) Plan

A plan designed to ensure that the business can continue to function even when a breach or incident occurs, outlining how functionality should be maintained in all capacities (where should services be shifted, if at all, what backups exist in the event of certain servers going down, etc.)

4
New cards

Disaster Recovery (DR) Plan

A plan designed specifically to address an organization’s response in the event of a major disaster, such as a fire, flood, or tornado, in order to restore services and their availability to users as quickly and efficiently as possible.

5
New cards

Incident Response (IR) Plan

A plan that acts as a set of guidelines and steps to be taken in the event of an incident from detection to the lessons learned. This can involve plans for communication, stakeholder management, BC, DR, continuity of operations (COOP), and retention.

6
New cards

Software Development Lifecycle (SDLC) Policy

A policy that defines how software, either organizationally developed or vendor developed, will be secure through the entire life cycle. This can involve software environment, testing, execution, maintenance, and provisioning/deprovisioning.

7
New cards

Change Management Policy

A policy that defines how a change will be submitted, approved, and implemented, designed to take both operational risk and cybersecurity into consideration during the change management process.

8
New cards

Password Standards

Standards that may define length, character use, reuse, and validity length for verification.

9
New cards

Access Control Standards

Standards that may define minimum requirements for account lifecycles, including but not limited to onboarding and offboarding policies, shared usage, and access requirements.

10
New cards

Physical Security Standards

Standards that include the minimum requirements for securing the physical premises and assets of an organization, often involving requirements for access control, security monitoring, and visitor entry.

11
New cards

Encryption Standards

Standards that detail the minimum requirements for data encryption at all organizational stages, including data at rest and in transit.

12
New cards

Change Management/Control Procedures

A specific set of procedures that oversee and evaluate how specific changes will be sourced, analyzed, and managed to provide a roadmap for the most effective implementation of the change.

13
New cards

Onboarding

The process of adding a new employee to a network or company, typically with procedures that standardize this process and outline the specific steps necessary to securely add the new employee.

14
New cards

Offboarding

The process of removing an employee from a network or company post-termination, defining the necessary steps to securely remove said employee including permission revocation, user account deletion, exit interviews, and asset retention.

15
New cards

Playbook

A procedural guide used to perform specific actions during an incident response, breaking down the steps necessary to complete the task.

16
New cards

Regulatory Requirements

Mandatory and legally enforceable security requirements that place standards and guidelines on how an organization protects itself, their data, and their customers from threats.

17
New cards

Legal Requirements

Legally enforced laws or regulations that may apply to an organization.

18
New cards

Industry Requirements

Laws and regulations specific to an industry, such as HIPAA.

19
New cards

Local/Regional Requirements

Involves laws that may differ from location to location, but must still be complied with by any industry or business that operates within that location. A prime example of such is the GDPR.

20
New cards

National Requirements

Requirements set into place by a specific country’s government for organizations that operate within their boundaries, such as the Federal Information Security Modernization Act (FISMA).

21
New cards

Global Guidelines

Guidelines that provide internationally accepted best practices, guidelines, and recommendations for the creation of a secure cyber landscape, but are not directly enforced by a single international governing body.

22
New cards

Governance

The method by which an organization monitors and controls their security programs, granting them the ability to protect the interests of the organization through oversight and policy implementation.

23
New cards

Board

A group of high-level individuals that is appointed by shareholders in the organization in order to delegate management duties to appropriate senior employees, and a critical component of a hierarchical structure.

24
New cards

Committee

A group of individuals chosen to specifically oversee and manage a specific component of an organization, typically involving subject matter experts (SMEs) and members of upper management.

25
New cards

Government Entity

A government-sponsored and -supported group that is appointed to oversee the creation of policies and compliance with said policies, such as CISA.

26
New cards

Centralized Governance

A hierarchical, top-to-bottom method of governance where a top entity is responsible for policies, standards, and the manner in which they are followed, which must be complied with at all lower levels.

27
New cards

Decentralized Governance

A model that relies on the lower portions of the organization in order to uphold security policies and standards of the primary organization in the manner in which they see fit.

28
New cards

Data Owner

Someone responsible for data. This individual should be one that best understands the data they are responsible for, not necessarily its point of origin.

29
New cards

Data Controller

The person responsible for deciding what and why the data needs to be collected, as well as how that data is processed.

30
New cards

Data Custodian/Steward

The person responsible for the safekeeping and protection of data, primarily focusing on the technical aspects of data security as opposed to the content or usage of the stored data.

31
New cards

Risk Management

How an organization identifies and responds to potential risks.

32
New cards

Risk Assessment

The process of assigning a risk severity value to an identified risk by assessing how likely the risk is to occur and what potential impact the risk would have on the organization if it occurs. There are many types.

33
New cards

Ad Hoc Risk Assessment

A type of risk assessment that is conducted in response to a particular occurrence or event.

34
New cards

Recurring Risk Assessment

A type of risk assessment that is conducted at preset intervals in order to monitor a risk, its potential impact, and its associated risk response.

35
New cards

One-Time Risk Assessment

A type of risk assessment that is used to provide a generalized overview of an organization’s risk profile at the current point in time.

36
New cards

Continuous Risk Assessment

A type of risk assessment that is used to monitor a risk on an ongoing basis, typically automated and best used for the identification of new or emerging threats.

37
New cards

Risk Analysis

The processes, methods, and technologies used to track, analyze, and evaluate risk.

38
New cards

Risk Severity

A metric used to choose which risk metrics best fit the situations.

39
New cards

Quantitative Risk Assessment

The use of numerical data, mathematical algorithms, statistics, and probability to produce replicable results, typically requiring more time for data collection.

40
New cards

Qualitative Risk Assessment

The use of subjective knowledge and experience in order to assess risk, typically quicker and best used when risk is difficult to numerically define.

41
New cards

Exposure Factor

How much damage an asset will incur when exposed to a particular risk, typically expressed as a percent.

42
New cards

Single Loss Expectancy (SLE)

The monetary amount of damage that would be incurred, based on the cost of the asset, every time a specified risk occurs. Calculated via the formula AV x EF.

43
New cards

Annual Rate of Occurrence (ARO)

A numerical calculation of how many times a risk is expected to occur in a year.

44
New cards

Annualized Loss Expectancy (ALE)

How much monetary damage can be expected each year from a specified risk, calculated via the formula “SLE x ARO”.

45
New cards

Probability

A numerical value used to indicate the chance of a vulnerability being exploited over a specific period of time.

46
New cards

Likelihood

The probability that a risk will occur, commonly expressed as a percentage.

47
New cards

Impact

What effect a risk would have on an organization if it were to occur.

48
New cards

Risk Register

A comprehensive guide to potential risks an organization may encounter, including information on likelihood, impact, description, and any other details that may be valuable to an organization.

49
New cards

Risk Matrix/Heat Map

A digestible visualization of risk, typically shown via a box matrix with the impact on one axis and the likelihood of occurrence on the other.

50
New cards

Key Risk Indicator (KRI)

A metric that can be used to identify increasing risk levels, the effectiveness of current risk controls, and the maintenance of acceptable residual risk.

51
New cards

Risk Owner

The individual or entity who assumes the responsibility of the oversight and management of risk, typically responsible for implementing controls to mitigate the identified risks.

52
New cards

Risk Threshold

The predefined boundary at which a risk becomes too high, typically requiring action and intervention once it is reached.

53
New cards

Risk Appetite

The amount of risk an organization is willing to take, typically used to balance operability with risk protection.

54
New cards

Expansionary Risk Appetite

A form of risk appetite in which one is willing to take higher risks at the chance of higher rewards.

55
New cards

Conservative Risk Appetite

A form of risk appetite in which one actively avoids taking risks, focusing on asset protection and stability.

56
New cards

Neutral Risk Appetite

A form of risk appetite in which one attempts to reach a balance between conservative and expansionary risks, offering moderate growth while granting protection to current assets and stability.

57
New cards

Risk Tolerance

The ability of an organization to withstand a risk and maintain operational functionality, especially as risk surpasses the risk appetite.

58
New cards

Risk Transference

A risk management strategy that shifts risk impact from one organization to another.

59
New cards

Risk Acceptance

A risk management strategy that occurs when an organization weighs the associated risks and decides the cost of addressing the risk is higher than its potential impact.

60
New cards

Exemption

A form of risk acceptance that acknowledges and approves the acceptance of a risk that lies beyond the risk appetite and risk tolerance of the organization, heavily scrutinized, documented, and must be approved by organizational leaders.

61
New cards

Exception

A form of risk acceptance used to allow for non-compliance to standards, policies, or procedures, often built on a case-by-case basis complete with total awareness of the risk.

62
New cards

Risk Avoidance

The decision to complete eliminate the risk by not engaging in the risky behavior, often not conducive to productivity and interactions but may be necessary for expediency.

63
New cards

Risk Mitigation

The decision to completely eliminate risks by not engaging in risky behavior, which may not be conducive to productivity and operations.

64
New cards

Risk Reporting

The process of creating, maintaining, and providing documentation of the status of the risk, typically used to inform the decision-making process.

65
New cards

Business Impact Analysis (BIA)

A type of analysis designed to identify the most critical functions an organization requires to operate as well as the systems that support these functions, using multiple metrics to identify and evaluate critical functions. There are four key metrics: recovery time objective, recovery point objective, mean time to repair, and mean time between failures.

66
New cards

Recovery Time Objective (RTO)

The time duration after a system failure but before repair that the organization can tolerate.

67
New cards

Recovery Point Objective (RPO)

The amount of data loss that an organization can tolerate during a system failure.

68
New cards

Mean Time To Repair (MTTR)

The average amount of time it takes to restore a system to normal functionality after a failure.

69
New cards

Mean Time Between Failures (MTBF)

The average time that occurs between failures, offering a metric for system reliability.

70
New cards

Vendor Assessment

A form of risk testing that ensures a particular vendor meets the agreed-upon security requirements, typically involving methods such as penetration testing, client audits, internal audit documentation, independent assessments, and supply chain analysis.

71
New cards

Penetration Testing

A method of vulnerability identification, of which there are multiple types. This often involves a distinct individual or party of individuals tasked with the subversion or bypassing of in-place security systems, followed by a report on the found vulnerabilities and weaknesses.

72
New cards

Right-to-Audit Clause

A provision of a contract between a vendor and client that ensures the client retains the permission to audit the vendor directly or via a third party.

73
New cards

Independent Assessment

A risk assessment that can be conducted by an entity not affiliated with either the client or vendor, providing a completely objective analysis of the vendor’s security posture and risk management strategies.

74
New cards

Supply Chain Analysis

A form of analysis that takes into account how products run through the supply chain as well as which outside vendors the organization makes contact with.

75
New cards

Vendor Selection

The process of choosing an appropriate vendor for the organization’s needs, which involve the thorough examination and assessment of all aspects of a potential vendor.

76
New cards

Due Diligence

The process of examining a vendor to the best of the organization’s ability to ensure the organization’s standards are met. This may involve the evaluation of vendor reputation, financial stability, product and service quality, security protocols, and regulatory compliance.

77
New cards

Conflict of Interest

A conflicting overlap in the vendor’s priorities as a result of meeting the needs of more than one client.

78
New cards

Service-Level Agreement (SLA)

A contract that outlines the minimum level of service a provider is expected to maintain and what the service provider will do if those minimums are not met.

79
New cards

Memorandum of Agreement (MOA)

A legally binding document between two parties that outlines the roles and responsibilities of the parties and their relationship to one another.

80
New cards

Memorandum of Understanding (MOU)

An informal agreement that outlines the relationship between parties, not legally binding.

81
New cards

Master Service Agreement (MSA)

A contract that specifies the baseline of expectations between a vendor and user over a prolonged period of time, acting as the primary contract for outlining baseline security and privacy requirements.

82
New cards

Work Order (WO)/Statement of Work (SOW)

Created for the purposes of addressing specific requirements for a project between an organization and a vendor.

83
New cards

Non-Disclosure Agreement (NDA)

A contract that can be used with individuals or third-party providers that specifies how sensitive information is treated during and after employment/use, specifying what information can or cannot be discussed as well as who said information can be shared with. Typical for the protection of sensitive information.

84
New cards

Business Partners Agreement (BPA)

An agreement that mitigates risk between two or more coordinating companies that outlines the expectations and responsibilities between two or more entities. Its extent depends on the partnership and may define profit-sharing specifications, delegation of duties and responsibilities, minimum security requirements, and best practices.

85
New cards

Vendor Monitoring

An ongoing process that analyzes a vendor’s compliance with business agreements and their performance of contractual obligations, which may include clear rules of engagement, performance monitoring, compliance monitoring, and financial monitoring.

86
New cards

Questionnaire

A method that can be applied to both vendor assessments and the vendor monitoring process to garner insight into a vendor, with effective versions tailored to address a specific area or subject.

87
New cards

Rules of Engagement

A set of agreements between a vendor or third party and the primary business that are established prior to any interaction, with rules detailing what systems may be access, what actions can be taken, when possible testing can occur, and any other details regarding the acceptable parameters of the testing, monitoring, or analysis.

88
New cards

Compliance Reporting

The process of documenting the methods used to inform interested parties of how an organization meets the applicable standards and regulations.

89
New cards

Internal Compliance Reporting

A type of compliance reporting designed to present compliance data to high-level entities within the organization, involving reports on gaps in compliance, current security posture, and recommendations for improvement, all used in the compliance decision-making process.

90
New cards

External Compliance Reporting

A type of compliance reporting designed to provide proof of compliance with applicable regulations and laws, often made as a requirement by governing agencies or external business partners.

91
New cards

Fine

A monetary penalty applied to an entity or organization in breach of compliance requirements.

92
New cards

Sanction

A formal penalty applied to an entity or organization when non-compliance occurs. This can vary from a warning to a criminal charge, and may also include financial penalties, limitations on business functions, or prison.

93
New cards

Reputational Damage

A result of a data breach or other non-compliance going public that may affect an organization’s business, such as via the loss of sales of withdrawal of partner support.

94
New cards

Loss of License

A result of non-compliance that results in the loss of an organization to legally perform certain functions for variable durations of time, ranging from a short time period (weeks, months, etc.) to permanent revocation.

95
New cards

Contractual Impacts

A result of non-compliance that may affect the stipulations of the contracts between business entities, potentially even leading to termination of the contract.

96
New cards

Due Diligence

A process by which an organization stays abreast of changes in compliance requirements, such as regulation updates or emerging threats to compliance.

97
New cards

Due Care

A process involving ensuring that the policies and processes used to achieve compliance are continually monitored and maintained.

98
New cards

Acknowledgement

Occurs when an organization formally states that the organization and its respective entities within are aware of applicable compliance requirements.

99
New cards

Attestation

Occurs when an organization formally states that they not only acknowledge compliance requirements, but also meet them. Typically done via a formal review of an organization.

100
New cards

Internal Compliance Monitoring

A method used to ensure that compliance is met and maintained within an organization, typically involving audits, reviews, and policy checks.