Copyright Goodheart-Willcox Co., Inc. Chapter 2 Information Security Fundamentals 39 Quick Look 2.1.1 Continued 4. How many controls are offered? 5. Review the fi rst fi ve controls. Click the name of each control to display detailed information about the control. 6. Discuss with your classmates why control 5 is an important control to implement. 7. Review the complete list of the 20 controls. Discuss with your class how these controls can help plan your cybersecurity defenses. SECTION REVIEW 2.1 Check Your Understanding 1. Which security principle relates to protecting data against unauthorized changes? 2. What is the practice of having multiple layers of security to protect against intruders? 3. Briefl y describe frameworks. 4. Nontraditional computing devices with Internet access describes _____. 5. What is the weakest link in an organization’s security policy and plan? Build Your Key Terms Vocabulary As you progress through this course, develop a personal cybersecurity glossary. This will help you build your vocabulary and prepare you for a career. Write a defi nition for each of the following terms, and add it to your cybersecurity glossary. attack surface CIA triad confi dentiality defense in depth frameworks integrity Internet of Things (IoT) nonrepudiation process