Risk Management and Disaster Recovery Lecture (lec 13)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terms related to risk management, disaster recovery, and cybersecurity based on the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Risk Management

The process of identifying, assessing, and controlling threats to an organization's capital and earnings.

2
New cards

Disaster Recovery Plan (DRP)

A documented process for recovering and protecting a business IT infrastructure in the event of a disaster.

3
New cards

Chief Information Security Officer (CISO)

An executive responsible for the security of information and data across an organization.

4
New cards

Cybersecurity Risk Assessment

The process of identifying, evaluating, and taking steps to minimize risk to digital assets.

5
New cards

Information Security Policies

Formalized rules and procedures for protecting an organization’s IT assets.

6
New cards

Firewalls

Network security devices that monitor incoming and outgoing network traffic based on predetermined security rules.

7
New cards

Intrusion Detection System (IDS)

A device or software application that monitors a network for malicious activities or policy violations.

8
New cards

Cryptography

The practice of secure communication in the presence of third parties.

9
New cards

Security Awareness Training

Educational programs that inform employees about cyber threats to reduce risks.

10
New cards

Business Continuity Planning (BCP)

A strategy to ensure critical business functions continue during a disaster.

11
New cards

Digital Forensics

The process of collecting, preserving, analyzing, and presenting electronic evidence.

12
New cards

Security in Layers

A strategy of applying multiple security measures to protect sensitive information.

13
New cards

Data Integrity

Ensuring the accuracy and consistency of data over its entire lifecycle.

14
New cards

Vulnerability Identification

The process of discovering weaknesses that could be exploited by attackers.

15
New cards

Social Engineering

Manipulative tactics used to trick individuals into divulging confidential information.