CSF 4003 Security and Risk Management - Chapter 1: Introduction

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

Security

Get a hint
Hint

Being free from danger, protected from loss, damage, unwanted modification, or other hazards.

Get a hint
Hint

Specialized Areas of Security

Get a hint
Hint

Multiple layers include physical, operations, communications, cyber (or computer), and network security.

Card Sorting

1/27

Anonymous user
Anonymous user
flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts from the lecture notes on Security and Risk Management.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Security

Being free from danger, protected from loss, damage, unwanted modification, or other hazards.

2
New cards

Specialized Areas of Security

Multiple layers include physical, operations, communications, cyber (or computer), and network security.

3
New cards

Information Security (InfoSec)

Focuses on the protection of information and the technology that stores and transfers it.

4
New cards

The C.I.A. Triangle

Confidentiality, Integrity, and Availability. Expanded into 9 critical characteristics of information to protect.

5
New cards

Confidentiality

Limiting access to information only to authorized individuals; protects from information disclosure.

6
New cards

Integrity

Only authorized individuals can change or delete the data.

7
New cards

Availability

Ensuring information is available when requested to authorized individuals only.

8
New cards

Privacy

The right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality.

9
New cards

Information Aggregation

Collecting and combining personal information from several sources, potentially without the original data owner's consent or knowledge.

10
New cards

Identification

The access control mechanism by which unverified entities provide a label by which they are known to the system.

11
New cards

Authentication

The access control mechanism that requires the validation and verification of a claimed identity.

12
New cards

Authorization

The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

13
New cards

Accountability

The access control mechanism that ensures all actions on a system can be associated with an authenticated identity; also known as auditability.

14
New cards

Threat

A potential risk to an information asset.

15
New cards

Attack

An ongoing act against an asset that could result in a loss.

16
New cards

Threat Agents

Damage or steal an organization's information or physical assets by using exploits to take advantage of a vulnerability.

17
New cards

Patent

Exclusive right granted for an invention.

18
New cards

Trademark

Recognizable sign, design, or expression that identifies products or services.

19
New cards

Trade Secret

Information that gives a business a competitive edge.

20
New cards

Copyright

Legal right granted to the creator of original works.

21
New cards

Management

The process of achieving objectives using a given set of resources.

22
New cards

Governance

The set of responsibilities and practices exercised by executive management to provide strategic direction and ensure objectives are achieved.

23
New cards

Planning

Activities necessary to support the design, creation, and implementation of information security strategies.

24
New cards

Policy

A set of organizational guidelines that dictate certain behavior within the organization.

25
New cards

Programs

InfoSec operations that are specifically managed as separate entities, such as a security education training and awareness (SETA) program.

26
New cards

Protection

Executed via risk management activities, including risk assessment and risk control, as well as protection mechanisms, technologies, and tools.

27
New cards

People

The most critical link in the information security program.

28
New cards

Project Management

The application of thorough project management discipline to all elements of the information security program.