Cyber Security Chapter 2

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

Adverse Events

1 / 17

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

18 Terms

1

Adverse Events

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data

New cards
2

Breach

Unauthorized access, disclosure, or acquisition of personally identifiable information by an unauthorized user or when an authorized user misuses the information

New cards
3

Business Continuity (BC)

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency

New cards
4

Business Continuity Plan (BCP)

The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption.

New cards
5

Business Impact Analysis (BIA)

An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption

New cards
6

Disaster Recovery (DR)

In information systems terms, the activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale

New cards
7

Disaster Recovery Plan (DRP)

The processes, policies and procedures related to preparing for recovery or continuation of an organization's critical business functions, technology infrastructure, systems and applications after the organization experiences a disaster

New cards
8

Disaster

when an organization’s critical business function(s) cannot be performed at an acceptable level within a predetermined period following a disruption

New cards
9

Event

Any observable occurrence in a network or system

New cards
10

Exploit

A particular attack. It is named this way because these attacks exploit system vulnerabilities

New cards
11

Incident

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits

New cards
12

Incident Handling

The mitigation of violations of security policies and recommended practices

New cards
13

Incident Response (IR)

The mitigation of violations of security policies and recommended practices

New cards
14

Incident Response Plan (IRP)

The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization’s information systems(s)

New cards
15

Intrusion

A security event, or combination of security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization

New cards
16

Security Operations Center

A centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions

New cards
17

Vulnerability

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited or triggered by a threat source

New cards
18

Zero Day

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 205 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard84 terms
studied byStudied by 176 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard54 terms
studied byStudied by 46 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard75 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard158 terms
studied byStudied by 111 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard46 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard25 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)