Cybersecurity and Risk Management Concepts

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

This set of flashcards covers important vocabulary related to cybersecurity and risk management concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Cybersecurity

The art of protecting networks, devices, and data from unauthorized access or criminal use.

2
New cards

CIA Triad

A model that encompasses three core principles of information security: Confidentiality, Integrity, and Availability.

3
New cards

Confidentiality

The protection of sensitive information from being accessed or disclosed by unauthorized individuals.

4
New cards

Integrity

The protection of data from unauthorized modification or destruction.

5
New cards

Availability

The assurance of timely and reliable access to data and systems by authorized users.

6
New cards

Risk Management

The process of managing risks to organizational operations, assets, or individuals resulting from the operation of an information system.

7
New cards

Risk Assessment

The phase of risk management that involves identifying assets and their potential threats.

8
New cards

Risk Mitigation

Deploying appropriate countermeasures to reduce risk.

9
New cards

Risk Acceptance

Accepting the loss using no countermeasures.

10
New cards

Penetration Testing

An evaluation method for assessing the security of systems by simulating attacks.

11
New cards

Qualitative Risk Analysis

A type of risk analysis that does not quantify risk but assesses it based on understanding.

12
New cards

Quantitative Risk Analysis

A type of risk analysis that uses numerical values to determine risk, often involving metrics like ALE.

13
New cards

Asset

Something of value to the organization that needs protection.

14
New cards

Threat

Something that could harm an asset.

15
New cards

Vulnerability

Lack of or weaknesses of countermeasures that can be exploited.

16
New cards

Risk Transference

Sharing risk with another entity, often through insurance.

17
New cards

Risk Avoidance

Removing the technology/activity that introduces risk.

18
New cards

Black Box Testing

A penetration testing strategy with zero knowledge from the tester's perspective.

19
New cards

Gray Box Testing

A penetration testing strategy with partial knowledge, typically from a user account perspective.

20
New cards

White Box Testing

A penetration testing strategy with full knowledge of the system, usually from an admin perspective.