InfoSec Terms

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

these terms are specifically from my second semester 2nd Test

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

ISO 27001

An ISO standard that provides information on implementing another ISO security standard and setting up an information security management system.

2
New cards

Security architecture models

Illustrate information security implementations and help organizations make improvements through adaptation.

3
New cards

NIST Risk Management Framework Component 3

Addresses how organizations respond to risk once that risk is determined based on risk assessment results.

4
New cards

SP 800-39

The NIST special publication titled 'Managing InfoSec Risk'.

5
New cards

Access Controls

Regulates the admission of users into trusted areas, both logical access to information systems and physical access to facilities.

6
New cards

ISO 27002

An ISO standard that provides a broad overview of various areas of security.

7
New cards

Single Loss Expectancy (SLE)

The calculated value associated with the most likely loss from a single occurrence of a specific attack.

8
New cards

Organizational feasibility

An analysis that examines how proposed information security alternatives contribute to efficiency, effectiveness, and overall operations.

9
New cards

Principles of Access Control

Built on the principles of least privilege, need-to-know, and separation of duties.

10
New cards

Clark-Wilson Integrity Model

A model based on change control principles, designed for the commercial environment.

11
New cards

Business Impact Analysis

The first phase of contingency planning, assessing the impact of adverse events on an organization.

12
New cards

Information Technology Infrastructure Library (ITIL)

A collection of methods and practices useful for managing the development and operation of IT infrastructures.

13
New cards

NIST Risk Management Framework Component 1

Addresses how organizations frame risk or establish a risk context.

14
New cards

Security Strategy Rule of Thumb

When a vulnerability exists in an important asset, implement security controls to reduce exploitation likelihood.

15
New cards

SP 800-14

The NIST special publication known as 'Generally Accepted Security Principles and Practices'.

16
New cards

Minimizing Exploitable Vulnerabilities

Apply layered protections, architectural designs, and administrative controls when a vulnerability can be exploited.

17
New cards

Mitigation

The risk treatment strategy focusing on planning and preparation to reduce the impact of incidents or disasters.

18
New cards

Baselining

A level of performance used to compare changes.

19
New cards

Bell-LaPadula (BLP) Model

An access control model with security rules preventing information movement from higher to lower security levels.

20
New cards

Incident Candidates

A term used in the Incident Response plan for events that represent potential loss.

21
New cards

Risk Management

A systematic approach to identifying, evaluating, and prioritizing risks to minimize their probability or impact.