midterm exam ni Rennnnnnnaty

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:32 AM on 3/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

66 Terms

1
New cards

Comprehensive

should address all aspects of information security

2
New cards

Independent

strategy should function independently of specific technologies

3
New cards

Living Document

strategies should evolve over time to address emerging threats and adapt

4
New cards

Long Life Span

should be designed for sustainability, with principles that remain applicable

5
New cards

Risk-Based Approach

The strategy focuses on identifying and mitigating risks based

6
New cards

Organizationally Significant

The strategy must align with the organization's goals, priorities, and business processes

7
New cards

Strategic

Tactical

Operational

The strategy operates on three levels

8
New cards

Strategic

Long-term vision

9
New cards

Tactical

Mid-term planning and resource allocation

10
New cards

Operational

Day-to-day implementation and monitoring

11
New cards

storage

transmission

processing

three states of information

12
New cards

Storage

Information at rest, such as data stored in databases

13
New cards

Transmission

Information in motion, such as data traveling over networks or between devices.

14
New cards

Processing

•as data being manipulated or accessed by applications or users.

15
New cards

Technology

Tools and systems used to protect information

16
New cards

Policy

Formal rules and procedures established by an organization

17
New cards

People

The human element, which involves educating and training users, enforcing security awareness

18
New cards

Confidentiality

refers to protecting information from unauthorized access. Ensuring only authorized individuals access information.

19
New cards

Symmetric Encryption

encryption method that uses a single key to encrypt and decrypt data

20
New cards

Asymmetric Encryption

encryption method that uses two different keys—a public key and a private key

21
New cards

Integrity

data are trustworthy, complete, and have not been accidentally altered or modified by an unauthorized user.

22
New cards

Hashing

transforming a given key or string of characters into another value for the purpose of security

23
New cards

Digital Signature

used to verify the authenticity and integrity of a digital document, essentially acting like a virtual fingerprint that confirms the origin of the data and ensures it hasn't been tampered with.

24
New cards

Availability

data are accessible when you need them.

25
New cards

Redundancy

creating duplicate copies of the same data.

26
New cards

Identification

•Establishing a user's identity.

claiming an identity, typically through usernames or IDs.

27
New cards

Authentication

: Verifying the identity of the user.

confirms the user's claimed identity

28
New cards

Authorization

Granting access based on identity.

user is allowed to do (permissions and access levels

29
New cards

Accountability

•Ensuring that the actions of the user are traceable.

that all actions performed by a user are logged and can be traced back to them.

30
New cards

Remote Authentication Dial-In User Service

RADIUS

to manage network access.

for example •A user connects to a network and is authenticated via RADIUS. Once authenticated, the user is authorized based on their role, and all network activities are logged for accountability.

31
New cards

Assets

Valuable items or resources that need protection.

32
New cards

Threats

•Potential causes of harm to assets.

33
New cards

Vulnerabilities

•Weaknesses in a system that can be exploited by threats.

34
New cards

Risks

•The potential impact of a threat exploiting a vulnerability.

35
New cards

Controls

: Measures put in place to mitigate risks

36
New cards

Physical Assets

These are tangible because they have a physical form (e.g., hardware, buildings, infrastructure).

37
New cards

Digital Assets

2.Intangible, as they include data, software, and intellectual property, which do not have a physical presence but hold value.

38
New cards

Human Assets

2.Intangible, as employees' knowledge and expertise contribute to the organization's value but are not physical assets.

39
New cards

Reputation

- Intangible, since trust and credibility affect an organization's success but cannot be physically measured

40
New cards

1.Natural Threats: Earthquakes, floods, fires.

2.Human-made Threats: Cyberattacks, sabotage, theft.

3.Technological Threats: System failures, malware.

Operational Threats: Employee errors, internal fraud

Types of Threats

41
New cards

1.Technical Vulnerabilities: Software bugs, unpatched systems, weak encryption.

2.Physical Vulnerabilities: Unsecured facilities, lack of surveillance.

3.Human Vulnerabilities: Lack of training, social engineering susceptibility.

Types of Vulnerabilities

42
New cards

Risk = Likelihood x Impact

Risk Calculation

43
New cards

cybersecurity

is a subcategory of information security

44
New cards

Information security

is a broad field that covers many areas such as physical security, endpoint security, data encryption, and network security

45
New cards

Identification

•Recognizing vulnerabilities in software, networks, or human behavior.

46
New cards

Risk Analysis

•Determining the potential impact of each risk.

47
New cards

Mitigation

: Implementing security controls to reduce risk

48
New cards

Role-Based Access Control

assigns permissions based on roles

49
New cards

Attribute-Based Access Control

considers attributes like location and device type.

50
New cards

Firewalls

Hardware or software solutions that monitor and control network traffic.

51
New cards

IDPS

Detecting and blocking malicious activities.

52
New cards

VPNs

Encrypting data transmission over the internet to secure remote access.

53
New cards

Network Segmentation

Isolating critical network components to minimize security risks.

54
New cards

Information Security Policies

A formalized statement outlining how an organization manages and protects its information assets.

55
New cards

ISO 27001

An international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System

56
New cards

NIST Cybersecurity Framework

A set of voluntary guidelines, best practices, and standards for improving cybersecurity risk management

57
New cards

COBIT

: A framework for IT governance and management, ensuring IT aligns with business objectives.

58
New cards

Gap Analysis

•Identifies deviations from security best practices.

59
New cards

Certification Process

Ensures compliance with industry standards

60
New cards

Information Security Blueprint

is a strategic plan that outlines an organization's approach to safeguarding its information assets against cyber threats

61
New cards

Role-Based Access Control

Assigns permissions based on user roles within the organization

62
New cards

Zero-Trust Security Models

Operate on the principle of "never trust, always verify

63
New cards

AI & Machine Learning

Automates threat detection and response, enabling rapid identification

64
New cards

Blockchain

Enhances data integrity and secures transactions through decentralized and tamper-proof ledgers.

65
New cards

Zero Trust Architectures

: Adopt models that require continuous verification of access requests

66
New cards

Quantum Cryptography

Develop advanced encryption methods to prepare for the security challenges posed by quantum computing capabilities.

Explore top flashcards

M13: Helminths
Updated 918d ago
flashcards Flashcards (33)
APEL All Vocab
Updated 252d ago
flashcards Flashcards (300)
Christianity quotes
Updated 276d ago
flashcards Flashcards (77)
Case studies
Updated 994d ago
flashcards Flashcards (22)
M13: Helminths
Updated 918d ago
flashcards Flashcards (33)
APEL All Vocab
Updated 252d ago
flashcards Flashcards (300)
Christianity quotes
Updated 276d ago
flashcards Flashcards (77)
Case studies
Updated 994d ago
flashcards Flashcards (22)