ISC2 Certified in Cybersecurity (CC) Domain 1: Security Principles

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Asset

A resource, person, or information of value to an organization that requires protection.

2
New cards

Threat

Any circumstance or event with the potential to harm an asset or organization.

3
New cards

Vulnerability

A weakness in a system, process, or control that can be exploited by a threat.

4
New cards

Risk

The potential for a loss or damage to an asset due to a threat exploiting a vulnerability.

5
New cards

Risk Assessment

The process of identifying, analyzing, and prioritizing risks to determine their potential impact.

6
New cards

Risk Mitigation

Actions or strategies taken to reduce the likelihood or impact of a risk.

7
New cards

Confidentiality

Ensuring that sensitive information is only accessible to authorized individuals.

8
New cards

Integrity

Ensuring the accuracy, consistency, and reliability of data throughout its lifecycle.

9
New cards

Availability

Ensuring that information and resources are accessible when required.

10
New cards

Security Control

A safeguard or countermeasure implemented to manage or reduce security risks.

11
New cards

Preventive Control

A security measure designed to prevent a security incident from occurring.

12
New cards

Detective Control

A security mechanism designed to identify and alert about security incidents.

13
New cards

Corrective Control

A control designed to restore systems or data after a security incident occurs.

14
New cards

Governance

The framework of policies, procedures, and processes used to ensure effective security management.

15
New cards

Compliance

Adherence to laws, regulations, and standards governing information security practices.

16
New cards

Incident Response

The organized approach to managing and mitigating the effects of a security breach.

17
New cards

Acceptable Use Policy

A document defining the acceptable use of organizational assets by users.

18
New cards

Access Control

The process of ensuring that only authorized individuals have access to systems and information.

19
New cards

Business Continuity Plan

A plan to ensure the continuation of critical business functions during and after a crisis.

20
New cards

Audit Trail

A record of activities and transactions used to monitor security events and detect anomalies.

21
New cards

Asset

A resource, person, or information of value to an organization that requires protection.

22
New cards

Threat

Any circumstance or event with the potential to harm an asset or organization.

23
New cards

Vulnerability

A weakness in a system, process, or control that can be exploited by a threat.

24
New cards

Risk

The potential for a loss or damage to an asset due to a threat exploiting a vulnerability.

25
New cards

Risk Assessment

The process of identifying, analyzing, and prioritizing risks to determine their potential impact.

26
New cards

Risk Mitigation

Actions or strategies taken to reduce the likelihood or impact of a risk.

27
New cards

Confidentiality

Ensuring that sensitive information is only accessible to authorized individuals.

28
New cards

Integrity

Ensuring the accuracy, consistency, and reliability of data throughout its lifecycle.

29
New cards

Availability

Ensuring that information and resources are accessible when required.

30
New cards

Security Control

A safeguard or countermeasure implemented to manage or reduce security risks.

31
New cards

Preventive Control

A security measure designed to prevent a security incident from occurring.

32
New cards

Detective Control

A security mechanism designed to identify and alert about security incidents.

33
New cards

Corrective Control

A control designed to restore systems or data after a security incident occurs.

34
New cards

Governance

The framework of policies, procedures, and processes used to ensure effective security management.

35
New cards

Compliance

Adherence to laws, regulations, and standards governing information security practices.

36
New cards

Incident Response

The organized approach to managing and mitigating the effects of a security breach.

37
New cards

Acceptable Use Policy

A document defining the acceptable use of organizational assets by users.

38
New cards

Access Control

The process of ensuring that only authorized individuals have access to systems and information.

39
New cards

Business Continuity Plan

A plan to ensure the continuation of critical business functions during and after a crisis.

40
New cards

Audit Trail

A record of activities and transactions used to monitor security events and detect anomalies.

41
New cards

Asset

A resource, person, or information of value to an organization that requires protection.

42
New cards

Threat

Any circumstance or event with the potential to harm an asset or organization.

43
New cards

Vulnerability

A weakness in a system, process, or control that can be exploited by a threat.

44
New cards

Risk

The potential for a loss or damage to an asset due to a threat exploiting a vulnerability.

45
New cards

Risk Assessment

The process of identifying, analyzing, and prioritizing risks to determine their potential impact.

46
New cards

Risk Mitigation

Actions or strategies taken to reduce the likelihood or impact of a risk.

47
New cards

Confidentiality

Ensuring that sensitive information is only accessible to authorized individuals.

48
New cards

Integrity

Ensuring the accuracy, consistency, and reliability of data throughout its lifecycle.

49
New cards

Availability

Ensuring that information and resources are accessible when required.

50
New cards

Security Control

A safeguard or countermeasure implemented to manage or reduce security risks.

51
New cards

Preventive Control

A security measure designed to prevent a security incident from occurring.

52
New cards

Detective Control

A security mechanism designed to identify and alert about security incidents.

53
New cards

Corrective Control

A control designed to restore systems or data after a security incident occurs.

54
New cards

Governance

The framework of policies, procedures, and processes used to ensure effective security management.

55
New cards

Compliance

Adherence to laws, regulations, and standards governing information security practices.

56
New cards

Incident Response

The organized approach to managing and mitigating the effects of a security breach.

57
New cards

Acceptable Use Policy

A document defining the acceptable use of organizational assets by users.

58
New cards

Access Control

The process of ensuring that only authorized individuals have access to systems and information.

59
New cards

Business Continuity Plan

A plan to ensure the continuation of critical business functions during and after a crisis.

60
New cards

Audit Trail

A record of activities and transactions used to monitor security events and detect anomalies.

61
New cards

Asset

A resource, person, or information of value to an organization that requires protection.

62
New cards

Threat

Any circumstance or event with the potential to harm an asset or organization.

63
New cards

Vulnerability

A weakness in a system, process, or control that can be exploited by a threat.

64
New cards

Risk

The potential for a loss or damage to an asset due to a threat exploiting a vulnerability.

65
New cards

Risk Assessment

The process of identifying, analyzing, and prioritizing risks to determine their potential impact.

66
New cards

Risk Mitigation

Actions or strategies taken to reduce the likelihood or impact of a risk.

67
New cards

Confidentiality

Ensuring that sensitive information is only accessible to authorized individuals.

68
New cards

Integrity

Ensuring the accuracy, consistency, and reliability of data throughout its lifecycle.

69
New cards

Availability

Ensuring that information and resources are accessible when required.

70
New cards

Security Control

A safeguard or countermeasure implemented to manage or reduce security risks.

71
New cards

Preventive Control

A security measure designed to prevent a security incident from occurring.

72
New cards

Detective Control

A security mechanism designed to identify and alert about security incidents.

73
New cards

Corrective Control

A control designed to restore systems or data after a security incident occurs.

74
New cards

Governance

The framework of policies, procedures, and processes used to ensure effective security management.

75
New cards

Compliance

Adherence to laws, regulations, and standards governing information security practices.

76
New cards

Incident Response

The organized approach to managing and mitigating the effects of a security breach.

77
New cards

Acceptable Use Policy

A document defining the acceptable use of organizational assets by users.

78
New cards

Access Control

The process of ensuring that only authorized individuals have access to systems and information.

79
New cards

Business Continuity Plan

A plan to ensure the continuation of critical business functions during and after a crisis.

80
New cards

Audit Trail

A record of activities and transactions used to monitor security events and detect anomalies.

81
New cards

Zero Trust

A security model that requires strict verification for every access attempt, regardless of the user's location.

82
New cards

Security Posture

The overall state of an organization's security, including its controls, policies, and procedures.

83
New cards

Change Management

A structured process for handling changes to systems, minimizing risks and disruptions.

84
New cards

Risk Register

A documented record of identified risks, their analysis, and the mitigation measures.

85
New cards

Control Framework

A structured set of guidelines and controls for implementing security policies.

86
New cards

Incident Management

The process of detecting, analyzing, and responding to security incidents.

87
New cards

Key Risk Indicator (KRI)

A metric used to signal potential risks that could impact organizational objectives.

88
New cards

Penetration Testing

A simulated attack on a system to identify vulnerabilities before they can be exploited.

89
New cards

Gap Analysis

A comparison of the current state of security with the desired state to identify areas for improvement.

90
New cards

Asset Inventory

A comprehensive list of all assets in an organization, including their value and criticality.

91
New cards

Third-Party Assessment

Evaluating external vendors or partners to ensure they meet security requirements.

92
New cards

Risk Avoidance

Eliminating an activity or process to entirely remove the associated risk.

93
New cards

Security Baseline

A minimum set of security controls required to protect systems and data.

94
New cards

Control Effectiveness

The degree to which a security control reduces or mitigates a specific risk.

95
New cards

Security Governance Committee

A group responsible for overseeing and aligning security with business objectives.

96
New cards

Continuous Improvement

Ongoing efforts to enhance security processes, policies, and controls.

97
New cards

Supply Chain Risk

Risks introduced through the dependencies on suppliers and service providers.

98
New cards

Acceptable Risk

The level of risk deemed tolerable for an organization to achieve its goals.

99
New cards

Data Retention Policy

Defines how long data is kept and the processes for its secure disposal.

100
New cards

Digital Forensics

The process of collecting and analyzing digital evidence to investigate security incidents.