6.3/6.4 Key Concepts Collect security process data (e.g., technical, and administrative)/Analyze test output and generate report Flashcards

Domain 6 (7 cards)

1
Q

is the process of ensuring that user accounts have the appropriate permissions and access levels to perform their job functions

A

Account management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are quantifiable measurements used to gauge an organization’s performance in achieving
its cybersecurity objectives and goals.

A

Key performance indicators (KPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Focus on effectiveness and efficiency of security processes
  • Measure the success of security initiatives and programs
  • Often tied to specific security objectives or strategies
  • Used to track progress and demonstrate value of security investments
A

Key characteristics for Key Performance Indicators (KPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are metrics used to measure and monitor specific risk factors that could impact an
organization’s cybersecurity posture. They serve as early warning signals for potential security
issues.

A

Key Risk Indicators (KRI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Focus on potential threats and vulnerabilities
  • Used to identify emerging risks or changes in risk levels
  • Often predictive in nature, helping to anticipate future security issues
  • Aligned with the organization’s risk management framework
A

Key Risk Indicators (KRI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enable individuals and organizations to report security
vulnerabilities or weaknesses they have discovered to the affected software/app vendor.
When vulnerabilities are reported, the vendor receiving the report is expected to investigate
and, if necessary, take appropriate steps to address the issue.

A

Ethical disclosure programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A monetary reward given to ethical hackers for successfully discovering and
reporting a vulnerability or bug to the application’s developer. Bug bounty programs
allow companies to leverage the hacker community to improve their systems’ security
posture over time, continuously through ethical disclosure.

A

Bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly