• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
What are the three sides of the CIA Triad?
Confidentiality, Integrity, Availability
When a threat agent exploits a vulnerability.
Exposure
A control used to mitigate potential losses.
Countermeasure.
Weakness in a mechanism that can threaten an asset.
Vulnerability
Lack of a countermeasure.
Vulnerability
Someone or something that uncovers a vulnerability and exploits it.
Threat Agent
Possibility of a threat occurring.
Risk
Long-Term, High-Level management instructions on how the organization is to be run.
Policies
Administrative controls that reflect an organization's goals and objectives and target a broad audience.
Policies
Administrative controls that define a process or rules to be used to support a policy.
Standards
Administrative controls that are specific instructions on performing targeted tasks.
Procedures
Concept of layered approach to security with loosest controls on the outside and hardest controls at the center.
Defense in-depth
What does ISO 27002/ISO 1799 cover.
A code of practice with guidelines for information security.
Military Classification Levels
Top Secret
Secret
Confidential
Sensitive but unclassified
Unclassified
Common Commercial Classification Levels
Confidential
Private
Sensitive
For Internal Use Only
Public
The process of proper investigation such as an examination of controls and policies concerning an asset.
Due Diligence
The conduct that a reasonable person will exercise in a particular situation.
Due Care
ALE
Annual Loss Expectancy
EAC
Estimated Annual Cost
This type of risk analysis utilizes the values of ALE and from risks and ranks them based on potential loss to the owner.
Quantitative Risk Analysis
This type of risk analysis often utilizes estimated potential and delayed losses.
Qualitative Risk Analysis
This type of qualitative risk analysis heavily relies on interviews with subject matter experts.
Delphi Method
Calculate the Single Loss Expectancy (SLE)
Asset Value x Exposure Factor = SLE
Calculate the Annualized Loss Expectancy (ALE)
SLE x Annualized Loss Expectancy (ALO) = ALE
The amount of risk after a safeguard is put into place.
Residual Risk
What is a good reason for the use of an automated risk analysis tool?
Information gathering would be minimized and expedited due to the amount of information built into the tool.
Which element of the CIA Traid ensures that resources are used only for intended purposes?
Availability
According to private sector data classification levels, how would salary levels and medical information be classified?
Private
Logical Controls are also known as?
Technical Controls
What type of Controls are most applicable to personnel security?
Operational Controls