(ISC2 CC) Domain 1: Security Principles

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

ISC2 CC Certified in Cybersecurity

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Adequate Security

Security in proportion to risk/impact

2
New cards

Artificial Intelligence

The ability of computers and robots to simulate human intelligence and behavior.

3
New cards

Bot

Malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and worm capabilities.

4
New cards

Administrative Controls

Controls implemented through policy and procedures.

Often in conjunction with physical and/or technical controls.

(i.e., Access control processes, requiring multiple personnel to conduct a specific operation; an access-granting policy for new users that requires login and approval by the hiring manager)

5
New cards

Physical Controls

Controls implemented through tangible mechanisms.

Often in conjunction with technical controls/systems (badge readers connected to door locks)

(i.e. walls, fences, guards, locks, etc.)

6
New cards

Security Controls

Safeguards or countermeasures applied to protect the confidentiality, integrity and availability of an information system and its information

7
New cards

Technical Controls

Security controls (safeguards or countermeasures) primarily implemented/executed through mechanisms contained in the hardware, software or firmware components of an Information System.

8
New cards

Asset

Anything of value that is owned by an organization.

9
New cards

Authentication

Verifying the identity of a user, process, or device,

Prerequisite to allowing access to resources in an Information System.

10
New cards

Authorization

The right or permission that is granted to a system entity to access a system resource.

11
New cards

Baseline

A documented, lowest level of security configuration allowed by a standard or organization.

12
New cards

Token

A physical object a user possesses that is used to authenticate the user's identity.

13
New cards

Biometric

Biological characteristics of an individual

(i.e. fingerprint, hand geometry, voice, iris patterns, etc.)

14
New cards

Classified or Sensitive Information

Information determined to require protection against unauthorized disclosure.

Marked to indicate classified status and classification level when in documentary form.

15
New cards

Confidentiality

Property: Data/information when not made available or disclosed to unauthorized persons/processes.

16
New cards

Integrity

Property: When information has not been modified in an unauthorized manner since being created, stored, or transmitted

17
New cards

Data Integrity

Property: Describes when data has not been modified in an unauthorized manner.

Data in storage, Data in processing, and Data in transit.

18
New cards

System Integrity

Property: Describes when a system performs its intended function, unimpaired, free from manipulation in an unauthorized manner.

19
New cards

Availability

Timely and reliable access to/use of information by authorized users.

20
New cards

Criticality

Measure: The degree to which an organization depends on an information system/information for the success of a mission or business function.

21
New cards

Sensitivity

Measure: The level of importance assigned to information by its owner, denoting its need for protection.

22
New cards

Encryption

The process and act of converting a message from plaintext to ciphertext; enciphering

23
New cards

Non-repudiation

The inability to deny taking an action.

(i.e. creating information, approving information, sending/receiving a message)

24
New cards

General Data Protection Regulation (GDPR)

In 2016, the European Union passed comprehensive legislation that addresses personal privacy, deeming it an individual human right.

25
New cards

Health Insurance Portability and Accountability Act (HIPAA)

This U.S. federal law is the most important healthcare information regulation in the United States. It directs the adoption of national standards for electronic healthcare transactions while protecting the privacy of an individual's health information. Other provisions address fraud reduction, protections for individuals with health insurance and a wide range of other healthcare-related activities. Est. 1996.

26
New cards

Privacy

The right of an party to maintain control and confidentiality over the information about themselves.

27
New cards

Personally Identifiable Information (PII)

Any data that can distinguish or trace an individual's identity

(i.e. common identifiers like name and Social Security number, biometric records, medical, educational, financial, and employment information.

28
New cards

Protected Health Information (PHI)

Information regarding health status, the provision of healthcare, or payment for healthcare as defined in HIPAA (Health Insurance Portability and Accountability Act).

29
New cards

Governance

The process of how an organization is managed.

Includes all aspects of how decisions are made; informed by policies, procedures, and roles.

30
New cards

International Organization of Standards (ISO)

Develops voluntary international standards in collaboration with its partners in international standardization, the International Electro-technical Commission (IEC) and the International Telecommunication Union (ITU), particularly in the field of information and communication technologies.

31
New cards

Internet Engineering Task Force (IETF)

The internet standards organization, made up of network designers, operators, vendors, and researchers, that defines protocol standards (IP, TCP, DNS) through a process of collaboration and consensus.

32
New cards

Institute of Electrical and Electronics Engineers

A professional organization that sets standards for telecommunications, computer engineering, and similar disciplines.

33
New cards

National Institutes of Standards and Technology (NIST)

Part of the U.S. Department of Commerce and addresses the measurement infrastructure within science and technology efforts within the U.S. federal government. Sets standards in a number of areas, including information security within the Computer Security Resource Center of the Computer Security Divisions.

34
New cards

Likelihood of Occurrence (Probability)

A weighted factor based on the likelihood of a given threat exploiting a given vulnerability/set of vulnerabilities.

Quantitative (Numeric, Percentage) measure

35
New cards

Likelihood

Chance of something happening

Qualitative (Low, Medium, High) measure

36
New cards

Impact

Measure: Magnitude of harm

37
New cards

Risk

Measure: The extent to which an entity is threatened by a threat (potential circumstance or event)

Impact x Likelihood of Occurrence (Probability)

38
New cards

Information Security Risk

The potential adverse impacts to an organization's operations (including its mission, functions and image and reputation), assets, individuals, other organizations, and even the nation, resulting from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information systems and/or information.

39
New cards

Threat

Any circumstance or event with the potential to cause adverse impacts to an organization’s operations (including mission, functions, image or reputation), assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

40
New cards

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

41
New cards

Risk Management

The process of identifying, evaluating and controlling threats, including all the phases of risk context (or frame), risk assessment, risk treatment and risk monitoring.

42
New cards

Risk Assessment

The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations. The analysis performed as part of risk management which incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place.

43
New cards

Qualitative Risk Analysis

A method for risk analysis that is based on the assignment of a descriptor such as low, medium or high.

44
New cards

Quantitative Risk Analysis

A method for risk analysis where numerical values are assigned to impact and likelihood based on statistical probabilities and monetarized valuation of loss or gain.

45
New cards

Risk Management Framework

A structured approach used to oversee and manage risk for an organization.

46
New cards

Risk Acceptance

Determination that the potential benefits of a business function outweigh the likelihood/impact of a risk; performing that business function with no other action.

47
New cards

Risk Avoidance

Determination that the likelihood/impact of a risk outweigh the potential benefits of a business function; not performing that business function.

48
New cards

Risk Mitigation

Implementing security controls to reduce potential impact/likelihood of a risk.

49
New cards

Risk Tolerance

The level of risk an entity is willing to assume in order to pursue a desired result.

(Risk threshold, risk appetite, acceptable risk)

50
New cards

Risk Transference

Paying an external party to accept the financial impact of a given risk.

51
New cards

Risk Treatment

The process of selecting and implementing controls to modify the level of risk.

52
New cards

Threat Actor

An individual or group posing a threat.

53
New cards

Threat Vector

The means or pathway by which a threat actor carries out their objectives.

54
New cards

Single-Factor Authentication

Use of just one of the three available factors of authentication

(something you know, something you have, something you are)

55
New cards

Multi-Factor Authentication

Use of two or more of the three available factors of authentication

(something you know, something you have, something you are)

56
New cards

State

The condition an entity is in at a point in time.