Manage Security Risks, Module 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Security framework

Guidelines used for building plans to help mitigate risk and threat to data and privacy

2
New cards

Security controls

Safeguards designed to reduce specific security risks

3
New cards

Encryption

The process of converting data from a readable format to an encoded format. It is used to ensure confidentiality of sensitive data, such as customers’ account information or social security numbers.

4
New cards

Plaintext

Readable text

5
New cards

Ciphertext

The raw, encoded message that’s unreadable to humans and computers. This data cannot be read until it’s been decrypted into its original plaintext form.

6
New cards

Exampes of controls

Encryption, authentication, authorization

7
New cards

Authentication

The process of verifying who someone or something is

8
New cards

Multi-factor authentication

Aka MFA

9
New cards

MFA

An advanced method of authentication that challenges the user to demonstrate that they are who they claim to be by requiring both a password and an additional form of authentication, like a security code or biometrics, such as a fingerprint, voice, or face scan

10
New cards

Biometrics

Unique physical characteristics that can be used to verify a person’s identity.

11
New cards

Examples of biometrics

Fingerprint, eye scan, palm scan.

12
New cards

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

13
New cards

Authorization

The concept of granting access to specific resources within a system

14
New cards

National Institute of Standards and Technology

Aka NIST

15
New cards

Risk Management Framework

Aka RMF

16
New cards

Cybersecurity Framework

Aka CSF

17
New cards

confidentiality, integrity, and availability triad

Aka CIA Triad

18
New cards

Health Insurance Portability and Accountability Act

Aka HIPAA

19
New cards

HIPAA

Requires that medical professionals keep patient information safe.

20
New cards

Cyber Threat Framework

Aka CTF

21
New cards

CTF

According to the Office of the Director of National Intelligence, this framework was developed by the U.S. government to provide “a common language for describing and communicating information about cyber threat activity.” By providing a common language to communicate information about threat activity, the CTF helps cybersecurity professionals analyze and share information more efficiently. This allows organizations to improve their response to the constantly evolving cybersecurity landscape and threat actors’ many tactics and techniques.

22
New cards

International Organization for Standardization/International Electrotechnical Commission 27001

Aka ISO/IEC 27001

23
New cards

ISO/IEC 27001

An internationally recognized and used framework. The family of standards enables organizations of all sectors and sizes to manage the seuciryt of assets, such as financial information, intellectual property, employee data, and information entrusted to third parties. This framework outlines requirements for an information security management system, best practices, and controls that support an organization’s ability to manage risks. Although the framework does not require the use of specific controls, it does provide a collection of controls that organizations can use to improve their security posture.

24
New cards

Examples of physical controls

Gates, fences, locks, security guards, closed-circuit television (CCTV), surveillance cameras, motion detectors, access cards or badges to enter office spaces.

25
New cards

Examples of technical controls

Firewalls, MFA, antivirus software

26
New cards

Examples of administrative controls

separation of duties, authorization, asset classification