section 1A

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Confidentiality

Only the people you picked get to read it.

2
New cards

Integrity

What’s stored/ sent is exactly what you meant.

3
New cards

Availability

It’s there when the good guys need it.

4
New cards

Non-repudiation

You can’t say you didn’t do that; digital receipts & signatures prove it.

5
New cards

NIST CSF

5-step lifecycle—Identify, Protect, Detect, Respond, Recover.

6
New cards

Gap analysis

Spreadsheet of 'what we have' vs 'what the framework says we need'.

7
New cards

AAA (IAM)

Identify → Authenticate → Authorize → Account.

8
New cards

CIA triad

A model that involves Confidentiality, Integrity, and Availability.

9
New cards

Identify

The first function of the NIST CSF, focusing on asset and risk identification.

10
New cards

Protect

The second function of the NIST CSF, implementing controls to mitigate risks.

11
New cards

Detect

The third function of the NIST CSF, identifying unauthorized access or incidents.

12
New cards

Respond

The fourth function of the NIST CSF, aiming to take action during a security incident.

13
New cards

Recover

The fifth function of the NIST CSF, restoring normal operations after a security incident.

14
New cards

Authentication

The AAA stage that proves identity, typically through passwords or tokens.

15
New cards

Authorization

The AAA stage that determines what resources are accessible to the user.

16
New cards

Accounting

The AAA stage that tracks user activities and audit logs.

17
New cards

CCTV recording

A non-repudiation measure that provides evidence of access to secure areas.

18
New cards

RBAC

Role-Based Access Control; a method of restricting system access based on roles.

19
New cards

ABAC

Attribute-Based Access Control; a method of controlling access based on attributes.

20
New cards

Confidentiality

Only the people you picked get to read it.

21
New cards

Integrity

What’s stored/ sent is exactly what you meant.

22
New cards

Availability

It’s there when the good guys need it.

23
New cards

Non-repudiation

You can’t say you didn’t do that; digital receipts & signatures prove it.

24
New cards

NIST CSF

5-step lifecycle—Identify, Protect, Detect, Respond, Recover.

25
New cards

Gap analysis

Spreadsheet of 'what we have' vs 'what the framework says we need'.

26
New cards

AAA (IAM)

Identify → Authenticate → Authorize → Account.

27
New cards

CIA triad

A model that involves Confidentiality, Integrity, and Availability.

28
New cards

Identify

The first function of the NIST CSF, focusing on asset and risk identification.

29
New cards

Protect

The second function of the NIST CSF, implementing controls to mitigate risks.

30
New cards

Detect

The third function of the NIST CSF, identifying unauthorized access or incidents.

31
New cards

Respond

The fourth function of the NIST CSF, aiming to take action during a security incident.

32
New cards

Recover

The fifth function of the NIST CSF, restoring normal operations after a security incident.

33
New cards

Authentication

The AAA stage that proves identity, typically through passwords or tokens.

34
New cards

Authorization

The AAA stage that determines what resources are accessible to the user.

35
New cards

Accounting

The AAA stage that tracks user activities and audit logs.

36
New cards

A non-repudiation measure that provides evidence of access to