Tier 3a — Security Principles

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:35 AM on 5/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

Threat

An external force that jeopardizes security

2
New cards

Threat vector

The method an attacker uses to reach the target

3
New cards

Threat actor

The person or group behind the threat

4
New cards

Vulnerability

A weakness in a system that an attacker could exploit

5
New cards

Risk

A threat combined with a corresponding vulnerability

6
New cards

Risk equation

Risk = Threat + Vulnerability

7
New cards

Likelihood

The probability that a risk will actually occur

8
New cards

Impact

The amount of damage if a risk materializes

9
New cards

Confidentiality

Keep data private — only authorized people can see it

10
New cards

Integrity

Data is accurate and unaltered by unauthorized parties

11
New cards

Availability

Systems work when users need them — uptime

12
New cards

Confidentiality example

Encryption, clean desk policy, screen locks

13
New cards

Integrity example

Hashing, digital signatures, file integrity monitoring

14
New cards

Availability example

Backups, redundancy, DDoS protection, fault tolerance

15
New cards

Risk avoidance

Change business practices to make the risk irrelevant

16
New cards

Risk transference

Move the risk to another party (e.g., insurance) — can't transfer 100%

17
New cards

Risk mitigation

Reduce the likelihood or impact of the risk

18
New cards

Risk acceptance

Acknowledge the risk and continue operations anyway

19
New cards

Inherent risk

Original level of risk before any controls are applied

20
New cards

Residual risk

Risk that remains after controls are applied

21
New cards

Control risk

New risk introduced BY the controls themselves

22
New cards

Risk tolerance

The level of risk the organization is willing to accept

23
New cards

Qualitative risk analysis

Subjective judgment grouped into categories (high/medium/low)

24
New cards

Quantitative risk analysis

Numeric ratings in dollars for likelihood and impact

25
New cards

Configuration management

Tracks how devices are set up — OS and software inventory

26
New cards

Baseline

Configuration snapshot at a given point in time

27
New cards

Baselining

Establishing a known-good config as a reference point

28
New cards

Versioning

Assigning numbers to track configuration changes over time

29
New cards

Version control

Tracks revisions to files/code over time

30
New cards

Configuration diagrams

Documents that show how systems are set up

31
New cards

Change management

Controls how changes happen to minimize risk

32
New cards

ISC2 Canon 1

Protect society, the common good, public trust, and the infrastructure

33
New cards

ISC2 Canon 2

Act honorably, honestly, justly, responsibly, and legally

34
New cards

ISC2 Canon 3

Provide diligent and competent service to principals

35
New cards

ISC2 Canon 4

Advance and protect the profession

36
New cards

Policy

Bedrock document of security expectations — MANDATORY

37
New cards

Standard

Specific details of required security controls — MANDATORY

38
New cards

Procedure

Step-by-step instructions to perform tasks — may or may not be mandatory

39
New cards

Guideline

Advice from security professionals — OPTIONAL

40
New cards

AUP

Acceptable Use Policy — authorized uses of technology

41
New cards

BYOD

Bring Your Own Device policy — personal devices for work

42
New cards

Something you know

Authentication factor — password, PIN, security question

43
New cards

Something you have

Authentication factor — token, debit card, authenticator app

44
New cards

Something you are

Authentication factor — biometric (fingerprint, iris, face)

45
New cards

MFA

Multi-Factor Authentication — combines TWO DIFFERENT factor categories

46
New cards

SSO

Single Sign-On — share authenticated session across systems (UX, not auth strength)

47
New cards

Non-repudiation

Prevents someone from falsely denying an action — provided by digital signatures

48
New cards

PII

Personally Identifiable Information — data traceable to an individual

49
New cards

PHI

Protected Health Information — medical records (governed by HIPAA)

50
New cards

PCI DSS

Payment Card Industry Data Security Standard — regulates payment card data

51
New cards

Preventive control

Stops a security issue from happening (firewall, MFA, fence)

52
New cards

Detective control

Identifies issues that have occurred (IDS, CCTV, log review)

53
New cards

Corrective control

Remediates issues after they happen (patching, restore from backup)

54
New cards

Technical control

Uses technology to achieve the control objective (a.k.a. logical)

55
New cards

Administrative control

Uses processes and policies (training, AUP)

56
New cards

Physical control

Impacts the physical world (locks, fences, guards, bollards)