• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
What is a Top-
Down Approach?
A top-down approach is when senior management initiates and fosters the company's security objective.
What is Due Care?
A leagal tem meaning that a person or company should take reasonable measures to protect itself and to not harm others.
What is Risk Management?
The process of identifying, assessing, and reducing risk to an acceptable level.
Define Risk Analysis?
A tool used to identify the company's assets, calculate their values, identify vulnerabilities, estimate the threats and associated risk and assess the impact the company would face if these agents took advantage of the current available vulnerbilities.
What are the four main goals of risk analysis?
1. Identify assets and their values.
2. Indentify threats.
3. Quantify the impact of potential loss.
4. Provide an economic balance between the possibvle impact of the risk and the cost of the countermeasure.
What is a Vulnerability?
A weakness in a mechanism that threatens the confidentiality, integrity, or availability of an asset.
What is a Threat?
Someone uncovering the vulnerablity and exploiting it.
What is Risk?
Probability of a threat agent exploiting a vulnerability
What is a countermeasure
Safegaurd put into place to mitigate the risk of a threat.
Waht is Data Diddiling?
Modifying data before it is imputted into a program or system as soon as it comes out.
Waht is a Denial of Service Attack?
Attack that commits so many resources on a victims system that it can no longer function in one aspect or another.
What are the three components to the CAI Triad?
Confidentiality, Integrity, and Availability.
What are the three main types of controls used to provide the security principles?
Administrative Ciontrols, Technical Controls, ans Physical Controls.