Primary security concern associated with cell phones and other mobile devices.
What are Storage Devices that can easily be lost or stolen.
A string of words used to authenticate a user
What is Passphrase
In this configuration there is no Host O/S present and is considered "Native" or "Bare Metal" _____
What is a Type I Hypervisor?
This concept states that users should be granted the minimum amount of access required to perform their duties.
What is Least Privilege?
Assessment, Authorization, and Monitoring
Identification and Authentication
System and Information Integrity
What are Security and Privacy Control Families?
They help identify users susceptible to phishing attacks.
What are Phishing simulations
Typos, Grammatical errors, Suspicious links
What are Things found in a Phishing email
Sniffing out the jackals malevolence, looking out for social engineering evidence, calling out suspect email elements
What is Actual Intelligence
This solution is an On-Demand online access to specific applications.
What is Software as a Service?
Any data item that can be easily or obviously tracked back to the person of origin.
What is PII (Personably Identifiable Information)?
This control separates user functionality, including interface services, from system management functionality.
What is System and Communication Protection?
Identify, coordinate, mitigate, investigate, and educate
What are 5 steps of incident response
Analysis of malware where decompiling the code would be considered
What is Static Analysis
You receive an email or text from an unknown number to contact urgently
What is T.O.A.D (Telephone Oriented Attack Delivery)
This lets you limit the types of data a user provides in a form.
What is Input Validation?
Threat * Vulnerability
What is Risk?
This control addresses the dependence on products, systems, and services from external providers.
What is Supply Chain Risk Management?