midterm exam ni Rennnnnnnaty

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 65

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

66 Terms

1

Comprehensive

should address all aspects of information security

New cards
2

Independent

strategy should function independently of specific technologies

New cards
3

Living Document

strategies should evolve over time to address emerging threats and adapt

New cards
4

Long Life Span

should be designed for sustainability, with principles that remain applicable

New cards
5

Risk-Based Approach

The strategy focuses on identifying and mitigating risks based

New cards
6

Organizationally Significant

The strategy must align with the organization's goals, priorities, and business processes

New cards
7

Strategic

Tactical

Operational

The strategy operates on three levels

New cards
8

Strategic

Long-term vision

New cards
9

Tactical

Mid-term planning and resource allocation

New cards
10

Operational

Day-to-day implementation and monitoring

New cards
11

storage

transmission

processing

three states of information

New cards
12

Storage

Information at rest, such as data stored in databases

New cards
13

Transmission

Information in motion, such as data traveling over networks or between devices.

New cards
14

Processing

•as data being manipulated or accessed by applications or users.

New cards
15

Technology

Tools and systems used to protect information

New cards
16

Policy

Formal rules and procedures established by an organization

New cards
17

People

The human element, which involves educating and training users, enforcing security awareness

New cards
18

Confidentiality

refers to protecting information from unauthorized access. Ensuring only authorized individuals access information.

New cards
19

Symmetric Encryption

encryption method that uses a single key to encrypt and decrypt data

New cards
20

Asymmetric Encryption

encryption method that uses two different keys—a public key and a private key

New cards
21

Integrity

data are trustworthy, complete, and have not been accidentally altered or modified by an unauthorized user.

New cards
22

Hashing

transforming a given key or string of characters into another value for the purpose of security

New cards
23

Digital Signature

used to verify the authenticity and integrity of a digital document, essentially acting like a virtual fingerprint that confirms the origin of the data and ensures it hasn't been tampered with.

New cards
24

Availability

data are accessible when you need them.

New cards
25

Redundancy

creating duplicate copies of the same data.

New cards
26

Identification

•Establishing a user's identity.

claiming an identity, typically through usernames or IDs.

New cards
27

Authentication

: Verifying the identity of the user.

confirms the user's claimed identity

New cards
28

Authorization

Granting access based on identity.

user is allowed to do (permissions and access levels

New cards
29

Accountability

•Ensuring that the actions of the user are traceable.

that all actions performed by a user are logged and can be traced back to them.

New cards
30

Remote Authentication Dial-In User Service

RADIUS

to manage network access.

for example •A user connects to a network and is authenticated via RADIUS. Once authenticated, the user is authorized based on their role, and all network activities are logged for accountability.

New cards
31

Assets

Valuable items or resources that need protection.

New cards
32

Threats

•Potential causes of harm to assets.

New cards
33

Vulnerabilities

•Weaknesses in a system that can be exploited by threats.

New cards
34

Risks

•The potential impact of a threat exploiting a vulnerability.

New cards
35

Controls

: Measures put in place to mitigate risks

New cards
36

Physical Assets

These are tangible because they have a physical form (e.g., hardware, buildings, infrastructure).

New cards
37

Digital Assets

2.Intangible, as they include data, software, and intellectual property, which do not have a physical presence but hold value.

New cards
38

Human Assets

2.Intangible, as employees' knowledge and expertise contribute to the organization's value but are not physical assets.

New cards
39

Reputation

- Intangible, since trust and credibility affect an organization's success but cannot be physically measured

New cards
40

1.Natural Threats: Earthquakes, floods, fires.

2.Human-made Threats: Cyberattacks, sabotage, theft.

3.Technological Threats: System failures, malware.

Operational Threats: Employee errors, internal fraud

Types of Threats

New cards
41

1.Technical Vulnerabilities: Software bugs, unpatched systems, weak encryption.

2.Physical Vulnerabilities: Unsecured facilities, lack of surveillance.

3.Human Vulnerabilities: Lack of training, social engineering susceptibility.

Types of Vulnerabilities

New cards
42

Risk = Likelihood x Impact

Risk Calculation

New cards
43

cybersecurity

is a subcategory of information security

New cards
44

Information security

is a broad field that covers many areas such as physical security, endpoint security, data encryption, and network security

New cards
45

Identification

•Recognizing vulnerabilities in software, networks, or human behavior.

New cards
46

Risk Analysis

•Determining the potential impact of each risk.

New cards
47

Mitigation

: Implementing security controls to reduce risk

New cards
48

Role-Based Access Control

assigns permissions based on roles

New cards
49

Attribute-Based Access Control

considers attributes like location and device type.

New cards
50

Firewalls

Hardware or software solutions that monitor and control network traffic.

New cards
51

IDPS

Detecting and blocking malicious activities.

New cards
52

VPNs

Encrypting data transmission over the internet to secure remote access.

New cards
53

Network Segmentation

Isolating critical network components to minimize security risks.

New cards
54

Information Security Policies

A formalized statement outlining how an organization manages and protects its information assets.

New cards
55

ISO 27001

An international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System

New cards
56

NIST Cybersecurity Framework

A set of voluntary guidelines, best practices, and standards for improving cybersecurity risk management

New cards
57

COBIT

: A framework for IT governance and management, ensuring IT aligns with business objectives.

New cards
58

Gap Analysis

•Identifies deviations from security best practices.

New cards
59

Certification Process

Ensures compliance with industry standards

New cards
60

Information Security Blueprint

is a strategic plan that outlines an organization's approach to safeguarding its information assets against cyber threats

New cards
61

Role-Based Access Control

Assigns permissions based on user roles within the organization

New cards
62

Zero-Trust Security Models

Operate on the principle of "never trust, always verify

New cards
63

AI & Machine Learning

Automates threat detection and response, enabling rapid identification

New cards
64

Blockchain

Enhances data integrity and secures transactions through decentralized and tamper-proof ledgers.

New cards
65

Zero Trust Architectures

: Adopt models that require continuous verification of access requests

New cards
66

Quantum Cryptography

Develop advanced encryption methods to prepare for the security challenges posed by quantum computing capabilities.

New cards
robot