Cybersecurity Foundations

Description

Instructional Designer Cybersecurity Foundations Flashcards on Cybersecurity Foundations, created by DLD EdTech on 21/03/2024.
DLD EdTech
Flashcards by DLD EdTech , updated 11 months ago
DLD EdTech
Created by DLD EdTech about 1 year ago
9
0
1 2 3 4 5 (0)

Resource summary

Question Answer
Any weakness in a system, procedure or control Vulnerability
Anything that can take advantage of a vulnerability Threat
A measure of the likelihood and consequence of a threat materializing Risk
The amount of risk an organization is willing to take to function Risk Tolerance
Safeguards, countermeasures or protection capability to avoid, detect, counteract, or minimize risks Security Controls
Guidelines and security standards to protect government information and operations Federal Information Security Modernization Act (FISMA)
The US government agency that defines scientific and technical measurements and standards National Institute of Standards and Technology (NIST)
DOS official policy manual Foreign Affairs Manuals (FAM)
DOS official procedures manuals Foreign Affairs Handbooks (FAHs)
Oversees an organization's information, cyber, and technology security Chief Information Security Officer (CISO)
Strategy for managing information security Information Assurance
Processes and tools used to protect information systems Information Security
Unsanctioned use of IT resources Shadow IT
A technically sophisticated and well-funded adversary Advanced Persistent Threat (APT)
An authorized user who knowingly or unknowingly uses their access to cause harm Insider Threat
The process of assessing and prioritizing risks to information and associated systems Risk Assessment
The process of identifying, assessing, and minimizing the impact of risk Risk Management
Implementing countermeasures to reduce risk Risk Mitigation
Ensuring timely and reliable access to and use of information Availability
Making the decision to allow someone to access a system or data Authorization
An authentication system that requires more than one distinct authentication factor for successful authentication Multi-Factor Authentication (MFA)
Granting a person just enough permissions to do their job and no more Least Privilege
Only granting access to information if a user needs it for their job "Need to Know"
Protecting unclassified information from being compiled and used by an adversary Operations Security (OPSEC)
Maintaining data in its original state, without unauthorized modification Integrity
Protecting data from unauthorized access Confidentiality
A security approach where trust is never assumed and access is constantly verified Zero Trust
The ability to prevent a user from denying they authored an electronic message or performed some kind of action Non-repudiation
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

CCNA Security Final Exam
Maikel Degrande
Spyware
Sam2
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
CyberSecurity
Stephen Williamson
Security Policies
indysingh7285
McAfee Advance Threat Defense - Training Quiz
esnlalan
Cisco IT Essentials 7.0 | Chapter 13: Security Exam
dksajpigbdu asdfagdsga
FIT3031 - Network Security Exam Practice
Nicholas Bagnall
The Vulnerability–Threat–Control Paradigm
Steve Ramirez
Cybersecurity: A Thorny Issue in Remote Working for CHROs
TOP CHRO