Copyright  Goodheart-Willcox  Co.,  Inc.  Chapter  2  Information  Security  Fundamentals  39  Quick  Look  2.1.1  Continued  4.  How  many  controls  are  offered?  5.  Review  the  fi  rst  fi  ve  controls.  Click  the  name  of  each  control  to  display  detailed  information  about  the  control.  6.  Discuss  with  your  classmates  why  control  5  is  an  important  control  to  implement.  7.  Review  the  complete  list  of  the  20  controls.  Discuss  with  your  class  how  these  controls  can  help  plan  your  cybersecurity  defenses.  SECTION  REVIEW  2.1  Check  Your  Understanding  1.  Which  security  principle  relates  to  protecting  data  against  unauthorized  changes?  2.  What  is  the  practice  of  having  multiple  layers  of  security  to  protect  against  intruders?  3.  Briefl  y  describe  frameworks.  4.  Nontraditional  computing  devices  with  Internet  access  describes  _____.  5.  What  is  the  weakest  link  in  an  organization’s  security  policy  and  plan?  Build  Your  Key  Terms  Vocabulary  As  you  progress  through  this  course,  develop  a  personal  cybersecurity  glossary.  This  will  help  you  build  your  vocabulary  and  prepare  you  for  a  career.  Write  a  defi  nition  for  each  of  the  following  terms,  and  add  it  to  your  cybersecurity  glossary.  attack  surface  CIA  triad  confi  dentiality  defense  in  depth  frameworks  integrity  Internet  of  Things  (IoT)  nonrepudiation  process  
