Security terms
GRC: governance,risk managment and compliance. GRC helps companies effectively
manage IT and security risks, reduce costs.
What is assets in cyber security?: An asset is any data, device or other component of an
organisation's systems that is valuable –
Internal security is the means by which the system protects its own data and internal
communications, and external security is the means by which the system protects external
communications. For the system, application messages are external communications.
proprietary: it relates to an owner (ownership
agents: een kat en muis spel tussen aanvallers en verdedigers
keyloggers: is een programma of een stuk hardware waarmee men de toetsaanslagen tot zelfs
de muisbewegingen van een computergebruiker kan registreren. dus alles wat je intypt kan de
hacker zien.
phising: is een vorm van internetfraude. Het bestaat uit het oplichten van mensen door ze te
lokken naar een valse website, die een kopie is van de echte website,
Spear-phishing is a targeted attempt to steal sensitive information such as account credentials
or financial information from a specific victim, often for malicious reasons.
usurpation: illegal andwrongful
ISMS: informatiebeveiligingsbeheer definieert en beheert controles die een organisatie moet
implementeren om ervoor te zorgen dat het de vertrouwelijkheid, beschikbaarheid op
verstandige manier beschermt tegen bedreigingen.
risk appetite: the amount of risk or types of risks an organisation is willing to take.
owners:people who are responsible for those assets.
countermesaures: it decrease the impact of a risk.
Data Integrity assures that information and programs are changed only in a specified and
authorized manner.
Whaling: is een techniek binnen de cybercriminaliteit waarbij een frauduleuze e-mail
verzonden wordt naar personen met een hoge functie .
worm: computer worm is a type of malware that spreads copies of itself from computer to
computer. A worm can replicate itself without any human interaction, and it does not need to
attach itself to a software program in order to cause damage
trojan: A Trojan Horse is a type of malware that pretends to be something useful, helpful, or
fun while actually causing harm or stealing data
mitigation: reducing risk of loss from the occurrence of any undesirable even
OSI security architecture: The OSI security architecture focuses on security attacks,
mechanisms, and services.
, least privilege: only gets accces to the rooms that they are assigned to.minimally necessary for
the function or role in various dimensions such as time, place, system, data, application, etc
seperation of privilege: information technology best practice applied by organizations to
broadly separate users and processes based on different levels of trust, needs, and privilege
requirements.]
zero-trust: eliminating trust
attack surface: where an unauthorized user (the "attacker") can try to enter data to or extract
data from an environment
atttack tree: showing how an asset, or target, might be attacked. .
killchain: doel is om inzicht te krijgen in de operaties van de ‘vijand’ Begrip van
technieken/tactieken van de ‘vijand’
Exposure: sensitive data are directly released to an unauthorized entity
Inference: a threat action whereby an unauthorized entity indirectly
accesses sensitive data (but not necessarily the data contained in the
communication) by reasoning from the characteristics or byproducts of
communications
Interception: an unauthorized entity directly accesses sensitive data
traveling between authorized sources and destinations
Intrusion: an unauthorized entity gains access to sensitive data by circumventing a system’s
security protections
UNAUTHORISED DISCLOSURE: A circumstance or event whereby an entity gains access
to data from which the entity is not authorized, a.k.a. data breach
Non repudation: , if you take a pen and sign a (legal) contract your signature is a
nonrepudiation device so you have proof
Data leak protection
Data proccesin agreements: is a legally binding document to be entered into between the
controller and the processor in writing or in electronic form. It
Disruption: (temporary or permanent) loss of service,
GDPR/AVG Elements: The General Data Protection Regulation (GDPR) is legislation that
updated and unified data privacy laws across the European Union
Avg: anti virus
Intellectual property data: is any intangible asset that is created from an original thought,
such as an idea, name, content, design, invention or digital media.
Property data:
System integrity: The quality that a system has when it performs its intended function in
an unimpaired manner, free from unauthorized manipulation of the system, whether
intentional or accidental. ??
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Sara009. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.40. You're not tied to anything after your purchase.