6.1 Flash Cards - Domain 1 - Security Principles

Adequate Security

Pasted image 20240328202347.png

Administrative Controls

Pasted image 20240328202425.png

Artificial Intelligence

Pasted image 20240328203748.png

Asset

Pasted image 20240328204302.png

Authentication

Pasted image 20240328204325.png

Authorization

Pasted image 20240328204348.png

Availability

Pasted image 20240328204458.png

Baseline

Pasted image 20240328204547.png

Biometric

Pasted image 20240328204614.png

Bot

Pasted image 20240328204952.png

Classified or Sensitive Info

Pasted image 20240328205137.png

Confidentiality

Pasted image 20240328205854.png

Criticality

Pasted image 20240328210104.png

Data Integrity

Pasted image 20240328210156.png

Encryption

Pasted image 20240328210224.png

General Data Protection Regulation (GDPR)

Pasted image 20240328210302.png

Governance

Pasted image 20240328210907.png

Health Insurance Portability and Accountability Act (HIPAA)

Pasted image 20240328211421.png

Impact

Pasted image 20240328211720.png

Information Security Risk

Pasted image 20240328211745.png

Integrity

Pasted image 20240328211806.png

International Organization Standards (ISO)

Pasted image 20240328212103.png

Internet Engineering Task Force (IETF)

Pasted image 20240328212133.png

Likelihood

Pasted image 20240328212206.png

Likelihood of Occurrence

Pasted image 20240328212240.png

Multi-Factor Authentication

Pasted image 20240328212312.png

National Institutes of Standards and Technology (NIST)

Pasted image 20240328212345.png

Non-repudiation

Pasted image 20240328212834.png

Personally Identifiable Information (PII)

Pasted image 20240328212936.png

Physical Controls

Pasted image 20240328213046.png

Privacy

Pasted image 20240328213110.png

Probability

Pasted image 20240328213137.png

Protected Health Information

Pasted image 20240328213201.png

Qualitative Risk Analysis

Pasted image 20240328213233.png

Risk

Pasted image 20240328213845.png

Risk Acceptance

Pasted image 20240328213907.png

Risk Assessment

Pasted image 20240328214037.png

Risk Avoidance

Pasted image 20240328214733.png

Risk Management

Pasted image 20240328214754.png

Risk Management Framework

Pasted image 20240328214838.png

Risk Mitigation

Pasted image 20240328215016.png

Risk Tolerance

Pasted image 20240328215036.png

Risk Transference

Pasted image 20240328215124.png

Risk Treatment

Pasted image 20240328215144.png

Security Controls

Pasted image 20240328215354.png

Sensitivity

Pasted image 20240328215445.png

Single-Factor Authentication

Pasted image 20240328215649.png

State

Pasted image 20240328215721.png

System Integrity

Pasted image 20240328215803.png

Technical Controls

Pasted image 20240328215856.png

Threat

Pasted image 20240328215916.png

Threat Actor

Pasted image 20240328215956.png

Threat Vector

Pasted image 20240328220019.png

Token

Pasted image 20240328220046.png

Vulnerability

Pasted image 20240328220728.png

Institute of Electrical and Electronics Engineers

Pasted image 20240328220822.png