Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
CIA Triad |
Availability Integrity Confidentiality |
|
Availiability |
RAID Clustering data backups |
|
Integrity |
Hashing digital signature |
|
Confidentiality |
Encryption Access Control |
|
Vulerability |
lack of a countermeasure weakness in a system |
|
Threat Agent |
Entity that can exploit a vulerability |
|
Risk |
Likelihood of a threat exploiting a vulerability |
|
Exposure |
Instance of being exposed to loses The more vulnerabilities the more exposure. |
|
Control |
Something put in place to reduce risk |
|
Threat |
Danger of a threat agent exploiting a vulnerability |
|
3 types of controls |
administrative technical physical |
|
Administrative control |
policy training documentation |
|
technical control |
software/hardware |
|
physical control |
fence, wall, gate |
|
6 Functions of Security Controls |
Deter Prevent Correct Recovery Detect Compensate (alternative) |
|
ISO 27000 |
Standard for how to build an maintain an IT security program |
|
test |
thia |