Introduction to Information Security: NIST SP 800-12 Key Concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:37 PM on 3/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Purpose

The primary purpose of this publication is to provide a broad overview and introduction to information security program principles.

2
New cards

Target Audience

It is designed to assist organizational managers and security practitioners in understanding how to establish, implement, and maintain an effective information security program.

3
New cards

Scope

It introduces foundational security concepts, interrelationships of security controls, and risk management strategies to help organizations understand the security needs of their respective systems.

4
New cards

Information Security

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

5
New cards

The CIA Triad

The foundation of information security is built on three core objectives: Confidentiality, Integrity, and Availability.

6
New cards

Confidentiality

Preserving authorized restrictions on information access and disclosure (protecting privacy and proprietary data).

7
New cards

Integrity

Guarding against improper information modification or destruction (ensuring data authenticity and non-repudiation).

8
New cards

Availability

Ensuring timely and reliable access to and use of information.

9
New cards

System / Information System

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.

10
New cards

Business Enabler

Security is not an end in itself; rather, it exists to support the organization's business goals and mission.

11
New cards

Operational Alignment

Information security measures should facilitate the organization's operations, not hinder them unnecessarily.

12
New cards

Risk-Based Approach

Organizations cannot realistically eliminate all risk. Therefore, they must implement protections that are proportional to the risk involved.

13
New cards

Cost-Benefit Analysis

The cost of implementing a security control should not exceed the value of the asset it protects or the potential cost of a security breach.

14
New cards

Resource Allocation

By understanding risk (threats, vulnerabilities, and potential impact), organizations can allocate their limited security resources to protect their most critical assets first.

15
New cards

External Constraints

Security programs do not operate in a vacuum. They must comply with laws, regulations, privacy rights, and societal norms.

16
New cards

Organizational Culture

The internal culture of an organization heavily dictates how security is perceived and practiced.

17
New cards

Balancing Act

Security professionals must balance the need for rigorous technical controls with ethical considerations and standard expectations of privacy.

18
New cards

Threats

Any circumstance or event with the potential to adversely impact an organization's operations, assets, or individuals.

19
New cards

Vulnerabilities

Weaknesses in an information system, internal controls, security procedures, or implementation that a threat could potentially exploit.

20
New cards

Risk

The potential for loss or harm that arises when a threat exploits a vulnerability.

21
New cards

Adversarial Threat Sources

Individuals, groups, or entities with malicious intent who deliberately target organizational systems.

22
New cards

Nature of Attacks

They actively seek to exploit vulnerabilities for a variety of reasons, utilizing methods that range from simple social engineering to highly sophisticated cyberattacks.

23
New cards

Malicious Hacker

An individual who attempts to gain unauthorized access to an IT system for malicious intent.

24
New cards

Motivations of Hackers

Hackers may be driven by various factors, including financial gain, ego or status, ideology, or simple malice.

25
New cards

Activities of Hackers

They actively scan for and exploit system vulnerabilities, often using advanced tools, scripts, or social engineering techniques.