DOMAIN 1: SECURITY PRINCIPLES

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

CEO, Murphy’s Law

Think like a ___ mindset and always considering __________

2
New cards

Confidentiality, Integrity, Availability

The 3 key areas of Cyber Security that needs to be protected.

3
New cards

Confidentiality

Information must not be exposed or accessed by any unauthorized individual.

4
New cards

Integrity

Information must be consistent and correct unless an authorized change was made.

5
New cards

Availability

Information must be accessible when and where it is needed.

6
New cards

Personally Identifiable Information (PII)

Terms Related to Confidentiality: pertains to any data about an individual that could be used to identify them

7
New cards

Protected Health Information (PHI)

Terms Related to Confidentiality: is information regarding one’s health status.

8
New cards

Health Insurance Portability and Accountability Act

Define the acronym: HIPAA

9
New cards

Classified or Sensitive information

which includes trade secrets, research, business plans and intellectual property

10
New cards

Data integrity

is the assurance that data has not been altered in an unauthorized manner regardless of the data in storage, during processing and while in transit.

11
New cards

System integrity

refers to the maintenance of a known good configuration and expected operational function as the system processes the information

12
New cards

State

is the current condition of the system. The awareness of the state is the ability to document and understand the state of data or a system at a certain point, creating a baseline

13
New cards

Baseline

refers to the current state of the information. Then, to preserve that state, the information must always continue to be protected through a transaction and any changes must undergo proper change management

14
New cards

criticality

Availability is often associated with the term _____________, because it represents the importance an organization gives to data or an information system in performing its operations or achieving its mission

15
New cards

Authentication, Authorization, Accountability

AAA Operations

16
New cards

Authentication

This process of verifying or proving the user’s identification.

17
New cards

Authorization

services determine which resources users can access, along with the operations that users can perform

18
New cards

Accountability

This is a legal term and is defined as the protection against an individual falsely denying having performed a particular action.

19
New cards

Privacy

A state of condition of being free from being observed or disturbed by other people.

20
New cards

July 25, 2011

Date? :Data Privacy Act of 2012

21
New cards

Data Privacy Act of 2012

It is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.

22
New cards

Authorization

The right or a permission that is granted toa system entity to access a system resource

23
New cards

Integrity

The property that data has not been altered in an unauthorized manner

24
New cards

Confidentiality

The characteristic of data or information when it is not made available or disclosed to unauthorized persons or processes

25
New cards

Privacy

The right of an individual to control the distribution of information about themselves.

26
New cards

Avaialability

Ensuring timely and reliable access to and use of information by authorized users.

27
New cards

Non-repudiation

The inability to deny taking an action, such as sending an email message.

28
New cards

Authentication

Access control process that compares one or more factors of identification to validate that the identity claimed by a user or entity is known to the system.

29
New cards

Asset

An __________ is something in need of protection

30
New cards

Vulnerability

A ___________ is a gap or weakness in those protection efforts.

31
New cards

Threat

A ___________ is something or someone that aims to exploit a vulnerability to thwart protection efforts.

32
New cards

Risk Assessment

defined as the process of identifying, estimating and prioritizing risks to an organization’s operations (including its mission, functions, image and reputation), assets, individuals, other organizations.

33
New cards

Risk Management Framework

A structured approach used to oversee and manage risk for an enterprise

34
New cards

Risk Treatment

is making decisions about the best actions to take regarding the identified and prioritized risk. The decisions made are dependent on the attitude of management toward risk and the availability — and cost — of risk mitigation.

35
New cards

Risk avoidance

is the decision to attempt to eliminate the risk entirely.

36
New cards

Risk mitigation

is taking actions to prevent or reduce the occurrence of a risk event or its impact.

37
New cards

Risk acceptance

is taking no action to reduce the likelihood of a risk occurring.

38
New cards

Risk transference

is the practice of passing the risk to another party, who will accept the financial impact of the harm resulting from a risk being realized in exchange for payment.

39
New cards

Risk Rejection

is not an acceptable response

40
New cards

Due Diligence

Doing research before implementation

41
New cards

Due Care

The implementation

42
New cards

Mitigation

Taking action to prevent or reduce the impact of an event

43
New cards

Acceptance

Ignoring the risks and continuing risky activities

44
New cards

Avoidance

Ceasing the risky activity to remove the likelihood that an event will occur

45
New cards

Vulnerability

An inherent weakness or flaw

46
New cards

Asset

Something of value that is owned by an organization, including physical hardware and intellectual property.

47
New cards

Threat

A person or entity that deliberately takes action to exploit a target

48
New cards

Transference

Passing risk to a third party

49
New cards

Qualitative risk analysis and Quantitative risk analysis

When risks have been identified, we prioritize and analyze core risks through

50
New cards

Qualitative risk analysis

How likely is to happen and how bad is it if it happens

51
New cards

Probability

The chances, or likelihood, that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities

52
New cards

Likelihood of occurrence

is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.

53
New cards

Impact

is the magnitude of harm that can be expected to result from the consequences of unauthorized Disclosure, Alteration or Destruction (DAD

54
New cards

Disclosure, Alteration, Destruction

DDD

55
New cards

Asset Register

Qualitative Analysis:

56
New cards

Annual Loss Expectancy

Quantitative Analysis:

57
New cards

Asset Value

AV -

58
New cards

Exposure Factor

EF -

59
New cards

Single Loss Expectancy

SLE -

60
New cards

Annual Rate of Occurence

ARO -

61
New cards

Annualize Loss Expectancy

ALE -

62
New cards

Adequate Security

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information.

63
New cards

Artificial Intelligence

The ability of computers and robots to simulate human intelligence and behavior.

64
New cards

Biometric

Biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns

65
New cards

Bot

Malicious code that acts like a remotely controlled “robot” for an attacker, with other Trojan and worm capabilities.

66
New cards

Criticality

A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.

67
New cards

General Data Protection Regulation

In 2016, the European Union passed comprehensive legislation that addresses personal privacy, deeming it an individual human right.

68
New cards

Health Insurance Portability and Accountability Act

This U.S. federal law is the most important healthcare information regulation in the United States. It directs the adoption of national standards for electronic healthcare transactions while protecting the privacy of individual’s health information.

69
New cards

Protected Health Information

Information regarding health status, the provision of healthcare or payment for healthcare as defined in HIPAA (Health Insurance Portability and Accountability Act).

70
New cards

Risk Acceptance

If the consequences of a risk are minor and the likelihood is unlikely, which type of risk response would be appropriate?

71
New cards

A complete asset inventory

What is required for us to do a proper risk assessment?

72
New cards

Confidentiality

After and attack we have suffered a loss of public confidence, which leg of the CIA was compromised?

73
New cards

Which of these is the most secure form of authentication

Multifactor authentication