Control/framework/Roles Flashcards

(35 cards)

1
Q

What are the three types of controls in cybersecurity?

A

Preventative
Detective
Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a preventative control?

A

They are designed to stop bad things from happening by preventing attacks before they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of preventative controls?

A

Unique usernames and passwords for each user

Locking accounts after multiple incorrect password attempts

Keeping software updated

Training users to be cautious when clicking on links in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do detective controls do?

A

They are used to detect something bad that is happening, such as a security breach or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of detective controls?

A

Antivirus and antimalware applications

Systems that monitor network activity for malicious behavior

Analyzing log files created by systems during use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are corrective controls used for?

A

They are used after an attack to restore things to normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of corrective controls?

A

Incident response
Forensic analysis
Restoring data from backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five functions of the NIST Cybersecurity Framework?

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

identify?

A

To identify assets and threats to those assets, ensuring that an organization spends its resources in the right places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protect?

A

Selecting, managing, and optimizing controls to protect the organization from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do the detect, respond, and recover functions exist in the NIST framework?

A

Because good cybersecurity assumes that a threat actor may succeed, so organizations need the capabilities to detect, respond to, and recover from an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the goal of the respond function in the NIST framework?

A

To respond to detected incidents in a controlled way with the objective of containing the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the goal of the recover function in the NIST framework?

A

To recover normal operations after an incident has been contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process for Using a Control Framework

A

Benchmark: Assess where the organization is currently against the framework.
Set Target Posture: Define the desired cybersecurity posture based on the framework.
Manage Change: Plan and manage the changes needed to achieve the target posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some essential controls that almost every organization will use in cybersecurity?

A

Applying updates (patching) to computer operating systems and applications.
Application whitelisting.
Hardening computers against attacks.
Limiting the number of people with administrative access to systems.
Implementing multifactor authentication (MFA).
Ensuring data is safely backed up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is patching an important cybersecurity control?

A

Patching software fixes vulnerabilities in the system that could be exploited by attackers.

17
Q

What is application whitelisting?

A

Configuring a computer to only run software that the organization explicitly permits, making it difficult for attackers to run malicious software.

18
Q

What does hardening a computer’s defenses mean?

A

Configuring all settings for security.

Removing unnecessary software and components to reduce vulnerabilities.

19
Q

What is multifactor authentication (MFA)?

A

A security control requiring users to provide something in addition to a username and password, such as a fingerprint, smartcard, or one-time code from a smartphone.

20
Q

Why is backing up data essential in cybersecurity?

A

It allows an organization to restore data and recover operations without paying a ransom if the data is tampered with, erased, or encrypted by an attacker.

21
Q

What is control assurance?

A

Control assurance ensures that cybersecurity controls are both operational and effective. It involves monitoring systems and testing controls to verify that they function as intended.

22
Q

Why do controls fail?

A

They are not enabled or are in an error condition.
They have flaws and haven’t been updated.
They were never configured properly.

23
Q

How can organizations ensure controls are operational?

A

Organizations can deploy monitoring systems and report key performance indicators (KPIs) for controls to ensure they are operational.

24
Q

How can organizations ensure controls are effective?

A

Organizations can test controls by simulating attacker behavior and verifying that the control works as expected.

25
What is the Capability Maturity Model?
A framework that mature organizations often use to manage control assurance and ensure controls are operational and effective.
26
What does OWASP stand for and what does it do?
The Open Web Application Security Project (OWASP) lists the top 10 most critical web application security risks and provides guidance on how to avoid them.
27
Why is it important to embed security into the software development lifecycle?
Embedding security into the software development lifecycle ensures that developers write secure code, identify vulnerabilities early, and continuously test for security flaws.
28
What is a penetration test?
A penetration test involves hiring someone to pretend to be a cyber attacker and try to exploit any vulnerabilities in an application or system.
29
How is DevOps different from traditional software development in terms of security?
In DevOps, many small updates are released daily, making it important to continuously integrate security practices and test code for vulnerabilities throughout development.
30
What is the role of a security architect in cybersecurity?
A security architect designs secure systems to ensure that the organization’s technology infrastructure is protected against cyber threats.
31
What does a security operations specialist do?
A security operations specialist monitors detective controls for attacker behavior and responds to attacks when detected.
32
What is the role of a penetration tester (ethical hacker)?
A penetration tester finds vulnerabilities in systems and applications by simulating attacks to identify weaknesses before malicious actors can exploit them.
33
What does a GRC (Governance, Risk, and Compliance) specialist do?
A GRC specialist conducts risk assessments and ensures the organization complies with internal policies and external regulations.
34
What is the role of a cybersecurity auditor?
A cybersecurity auditor tests and attests to the effectiveness of controls within the organization and ensures they are properly managed and working.
35
Why is it important for every technology team member to have security skills?
It’s important that all technology team members (e.g., network builders, system developers, application developers) are responsible for building secure systems to reduce the risk of vulnerabilities.