• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

CIA Triad

Availability


Integrity


Confidentiality

Availiability

RAID


Clustering


data backups

Integrity

Hashing


digital signature

Confidentiality

Encryption


Access Control

Vulerability

lack of a countermeasure


weakness in a system

Threat Agent

Entity that can exploit a vulerability

Risk

Likelihood of a threat exploiting a vulerability

Exposure

Instance of being exposed to loses


The more vulnerabilities the more exposure.

Control

Something put in place to reduce risk

Threat

Danger of a threat agent exploiting a vulnerability

3 types of controls

administrative


technical


physical

Administrative control

policy


training


documentation

technical control

software/hardware

physical control

fence, wall, gate

6 Functions of Security Controls

Deter


Prevent


Correct


Recovery


Detect


Compensate (alternative)

ISO 27000

Standard for how to build an maintain an IT security program

test

thia