• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
The goal of security is?
CIA
What does CIA stand for
Confidentiality, integrity, availability
Ensures that information is accessed only by authorized personnel
confidentiality
Enusres that information is modified only by authorized personnel
integrity
Ensures that infor and systems can be accessed when needed by authorized personnel
availability
Who's job is to provide highly available reliable data to only those who should have access when they need access
security specialist
The process used to identify control and mitigate the impact of uncertai events
risk management
what is the goal of risk management
reduce risk and maintain the cia triad
How do you minimize risks
identifying risks and creating a mitigation plan for those risks
making something less harmful or less painful
mitigation
Identify the potential risks, threats, and vulnerabilities to
minimize risks
the exposure to loss or possible injury (company can fall prey to outside forces and cause your company losses in time, money and reputation
risk
Any activity that represnets possible danager
threat
weakness in your information secuirty that could be exploited by a threat (weakness in system and network security processes and procedures
vulnerability
There is a limit to the value of implementing protection so you must combine your knowledge of value threats, vulnerabilities and risks to put together a feasible plan

T/F
true