Module 1 Flashcards

(48 cards)

1
Q

what are the NIST CSF (cybersecurity framework) tiers?

A

tier 1 -Partial
Tier 2 - risk informed
tier 3 - Repeatable
tier 4 - Adaptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

list the 2 NIST profiles and describe them

A

current profile - “as is “ state of system cybersecurity

Target profile - the desired outcome “to be” state of cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what could you gain by comparing current profile with target profile

A

gaps in your cybersecurity that need to be addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST cybersecurity framework Tier 3 explain

A

Repeatable -

  • – risk management practices are formally approved and expressed as policy
  • – cybersecurity practices are regularly updated based on risk management processes and changing threat landscape
  • – organization-wide approach to manage cybersecurity
  • – risk informed policies, processes, and procedures are defined implemented as intended and reviewed.
  • –senior executives ensure consideration of cybersecurity through all lines of operation
  • – the organization understands its role, dependencies, and dependents in the larger ecosystem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST cybersecurity framework tier 4, explain

A

Adaptive -

  • – Risk Management process
  • – org adapts its cyvbersecrui9ty practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators
  • – organization actively adapts to a changing threat and technology landscape and response in a timely and effective manner.
  • – integrated risk management -
  • – organization wide approach to managing cybersecurity risk that uses risk-informed policies, processes, and procedures to address potential cybersecurity events.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the 4 NIST framework core elements

A

Functions
Categories
subcategories
Informative References

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

explain the role of functions within the NIST framework

A

Functions - organize basic cyber security activities at their highest level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain the role of categories within the NIST framework

A

categories - are the subdivisions of a function into groups of cybersecurity outcomes closely tied to programmatic needs and particular activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is: further divide a category into specific outcomes of technical and/or management activities

  1. function
  2. category
  3. sub-category
  4. informative references
A

subcategories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain the role of informational references within the NIST framework

A

informative references - are specific sections of standards, guidelines, and practices common among critical infrastructure associated with each subcategory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the 5 functions in the NIST cybersecurity framework

A
  1. Identify
  2. protect
  3. detect - in a timely manner… 72hrs or less per GDPR
  4. respond
  5. recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what NIST Cybersecurity framework function would this describe:
develop an organizational understanding to manage cybersecurity risk to system, people, assets, data and capabilities

A
  1. Identify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what NIST cybersecurity framework function would be: develop and implement appropriate safeguards to ensure deliver of critical infrastructure services

A
  1. Protect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what NIST Cybersecurity Framework function would be defined as:
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event

A
  1. Detect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what cybersecurity framework function would be: develop and implement appropriate activities to take action regarding a detected cybersecurity incident

A
  1. Respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what NIST CSF function would be: develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to the cybersecurity incident

A
  1. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

list the 4 NIST framework core features

A

1, functions

  1. categories
  2. subcategories
  3. informative references
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
what function would these categories belong to?
asset management
business environment
governance 
risk assessment
risk management strategy
supply chain risk management
A

Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what function would these categories belong to?
identify management and access control
awareness training
data security
information protection processes and procedures
maintenance
protective technology

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what function would these categories belong to?
anomalies and events
security continuous monitoring
detection processes

21
Q
what function would these categories belong to?
response planning
communications
analysis
mitigation 
improvements
22
Q

what function would these categories belong to?
recovery planning
improvements
communication

23
Q

who controls the CMMC 2.0 model?

24
Q

security incident response lifecycle includes these four areas

A
  1. Preparation
  2. detection and analysis
  3. containment, eradication & recovery
  4. post incident activity
25
what clause/section in the ISO 27001 standard addresses encryption
cryptography
26
what is the purpose of the NIST cybersecurity framework
to help organizations understand their cybersecurity risks and how to reduce risks with customized measures
27
define federal contract information (FCI)
information, not intended for public release, provided by or generated for the government under a contract to develop or deliver a product or service to the government
28
4 steps in Incident security
1. Preparation 2. detection and analysis 3. containment, eradication, and recovery 4. post-incident activity
29
this NIST publication is titled "guide to storage encryption technologies for end user devices" and describes valid encryption processes for data at rest
NIST publication 800-111
30
when NIST cybersecurity framework moved from 1.1 to 1.2 what was added under Identify
supply chain risk management
31
NIST cybersecurity framework how many functions, categories and sub-categories
``` functions = 5 categories = 23 sub-categories = 108 ```
32
NIST cybersecurity framework how many tiers and profiles
``` tiers = 4 profiles = 2 ```
33
additional definition to NIST profile
a framework profile represents the outcomes based on the business needs an organization has selected from the framework categories and subcategories
34
define tier 3 - repeatable
repeatable processes are in place to counter threats. formal risk-management processes and clearly defined security policies - cybersecurity practices are regularly updated - organization wide approach
35
define the NIST tier 4 - adaptable
continuous improvements and adaptation - regularly conduct risk assessments and adapt security policies and procedures to counter the latest threats - advanced analytics and best practices - organization wide approach - actively adapts to a changing threat and technology landscape
36
define the NIST tier 2 - risk informed
risk management practices are approved by management - might not be an organization wide policy on risk management - key stakeholders are aware of the main risks - few controls and policies in place
37
define the NIST tier 1 - partial
lowest tier, cybersecurity risk management has not been formalized and documented - threats are encountered on an ad hoc basis - the organization does not understand its role in the larger ecosystem - limited cybersecurity awareness
38
A framework implementation tier is a rating that provides what?
context on how an organization views cybersecurity risks and the processes they have in place to mange that risk
39
CMMC 2.0 level 1 is focused on what
federal contract information (FCI)
40
preservation is defined as
process to maintain and safeguard the integrity and original condition of potential evidence
41
a framework implementation tier is a rating that provides what
context on how an organization views cybersecurity risk and the processes they have in place to manage that risks
42
what is CMMC level 1 focus on
FCI (federal contract information)
43
what is CMMC level 2 focus on
CUI (controlled unclassified information)
44
what NIST CSF function would be: develop the organization understanding to manage cybersecurity risk to system , assets, data and capabilities
1. identify
45
what NIST CSF function would be: develop and implement the appropriate safeguards to ensure deliver of critical infrastructure services
2. Protect
46
what NIST CSF function would be: develop and implement the appropriate activities to take action regarding a detected cybersecurity event
4. Respond
47
what NIST CSF function would be: Develop and implement that appropriate activities to maintain plan for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event
5: Recover
48
what function would have the following categories: recovery planning improvements communication
5. Recover