Security/Compliance

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

These flashcards cover the foundational concepts of information security as discussed in the MongoDB training, focusing on key definitions, practices, risks, and the company's unique offerings.

Last updated 11:09 PM on 2/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

What is information security?

The practice of protecting information by mitigating risks.

2
New cards

What does it mean to mitigate risks?

To reduce or lessen risks associated with information security.

3
New cards

What is a data breach?

An incident where an organization's sensitive information is accessed, exposed, or stolen by unauthorized individuals.

4
New cards

On average, how long did it take organizations to contain a data breach in 2023?

292 days.

5
New cards

What percentage of data breaches in 2023 involved customer personal data?

46%.

6
New cards

What are the three components of the CIA triad?

Confidentiality, Integrity, and Availability.

7
New cards

What is encryption?

The process of concealing information so it can only be accessed by authorized parties.

8
New cards

What are the three states of data that needs to be protected?

Data in transit, data at rest, and data in use.

9
New cards

What is queryable encryption?

A technology that allows organizations to execute searches directly on encrypted data without needing to decrypt it first.

10
New cards

How does queryable encryption benefit data protection?

It keeps data encrypted at every stage, reducing the risk of sensitive data exposure or breaches.

11
New cards

What is authentication?

The process of verifying a user's or application's identity.

12
New cards

What does authorization manage?

User permissions to determine what actions they are allowed or restricted from performing.

13
New cards

What is role-based access control (RBAC)?

A method of managing user permissions based on their assigned roles.

14
New cards

What is auditing in the context of security?

The process of monitoring and recording user activities while they access resources.

15
New cards

What is compliance?

The act of following rules, standards, or laws set by an organization or governing body.

16
New cards

What are examples of regulations that organizations must comply with?

HIPAA, GDPR, CCPA, and FedRAMP.

17
New cards

What does the shared responsibility model define?

How security responsibilities are divided between MongoDB as the cloud provider and the customer.

18
New cards

What is one advantage of using MongoDB's Atlas service for security?

It offers the highest level of built-in security by managing much of the security burden.