Risk Management and Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts in risk management and cybersecurity, including definitions of terms that are crucial for understanding the subject matter.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

18 Terms

1
New cards

Risk

A situation involving exposure to danger with the possibility of an unpleasant outcome.

2
New cards

ISO 31000

An international standard providing a common approach to manage any kind of risk.

3
New cards

NIST

National Institute of Standards and Technology, a U.S. governmental organization developing standards for security and privacy.

4
New cards

Asset

A part of an organization that needs protection from risks to avoid exploitation by threats.

5
New cards

Information Security Management System (ISMS)

A framework of policies and procedures for managing sensitive company information to remain secure.

6
New cards

Risk Assessment Process

The systematic process of identifying, analyzing, and evaluating risks.

7
New cards

Threat Identification

The process of determining potential threats that could exploit vulnerabilities within an organization.

8
New cards

Attack Trees

A diagram that represents the various ways that an attack on a system can occur, illustrating the goals and potential actions of an attacker.

9
New cards

Vulnerability

A weakness in an asset or control that can be exploited by one or more threats.

10
New cards

Ransomware

Malware that encrypts files or blocks access to data until a ransom is paid.

11
New cards

Threat Modeling

A strategic process to identify and evaluate threats to an organization's assets.

12
New cards

K-Anonymity

A privacy protection technique ensuring that each released information is indistinguishably related to at least k individuals.

13
New cards

Differential Privacy

A technique that ensures that the inclusion or exclusion of a single data point does not significantly affect the outcome of data analysis.

14
New cards

Digital Certificate

An electronic document used to prove the ownership of a public key in public key infrastructure.

15
New cards

Privilege Escalation

A scenario where a user gains elevated access to resources that are normally protected from the user.

16
New cards

Multi-Factor Authentication (MFA)

An authentication method that requires two or more verification factors to gain access to a resource.

17
New cards

Cryptography

The practice and study of techniques for securing communication and information through the use of codes.

18
New cards

SIEM (Security Information and Event Management)

A solution that aggregates and analyzes log data from across an organization's technology infrastructure.