Module 3 Flashcards

(62 cards)

1
Q

What are Security Frameworks?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name for guidelines used for building plans to help mitigate risk and threats to data and privacy?

A

Security Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Security Life Cycle?

A

A constantly evolving set of policies and standards that define how an organisation manages risks, follows established guidelines, and meets regulatory compliance or laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name for a constantly evolving set of policies and standards that define how an organisation manages risks, follows established guidelines, and meets regulatory compliance or laws.

A

Security Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the purposes of Security Frameworks?

A
  • Protecting PII
  • Securing financial information
  • Identifying security weaknesses
  • Managing organisational risks
  • Aligning security with business goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Four Core Components of Frameworks?

A
  • Identifying and documenting security goals
  • Setting guidelines to achieve security goals
  • Implementing strong security processes
  • Monitoring and communicating results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Security Controls?

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIA Triad?

A

A foundational model that helps inform how organisations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the “CIA” in “CIA Triad” stand for?

A

Confidentiality. Integrity. Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by Confidentiality?

A

Only authorised users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by Integrity?

A

Data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by Availability?

A

Data is accessible to those who are authorised to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an “Asset”?

A

An item perceived as having value to an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the NIST Cybersecurity Framework (CSF)?

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does NIST stand for?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are disgruntled employees some of the most dangerous threat actors?

A

They often have access to sensitive information and know where to find it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the NIST?

A

A U.S-based agency that develops Compliance Frameworks that organisations worldwide can use to help manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are two examples of NIST frameworks?

A
  • NIST CSF (Cybersecurity Framework)
  • NIST RMF (Risk Management Framework)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are he Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)?

A

A regulation that applies to organisations that work with electricity or that are involved with the North American Power Grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does “CIP” stand for?

A

Critical Infrastructure Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does FERC stand for?

A

The Federal Energy Regulatory Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NERC stand for?

A

North American Electric Reliability Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does FedRAMP stand for?

A

The Federal Risk and Authorization Management Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Federal Risk and Authorization Management Program (FedRAMP) ?

A

U.S. government program that standardises security assessment, authorisation, monitoring, and handling of cloud services and product offerings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the purpose of the Federal Risk and Authorization Management Program (FedRAMP)?
To provide consistency across the government sector and third-party cloud providers
26
What does CIS stand for?
Center for Internet Security
27
What is the Center for Internet Security (CIS) ?
A nonprofit with multiple areas of emphasis that provides a set of controls that can be used to safeguard systems and networks against attacks
28
What is the purpose of the Center for Internet Security (CIS)?
- To help organisations establish a better plan of defence - Provide actionable controls that security professionals may follow if a security incident occurs
29
What does GDPR stand for?
General Data Protection Regulation
30
What's is the General Data Protection Regulation (GDPR)?
An E.U. general data regulation that protects the processing of E.U. residents' data and their right to privacy in and put of E.U. territory
31
Under GDPR, how long does an organisation have to alert an E.U. citizen if their data compromised?
72 hours
32
What does PCI DSS stand for?
Payment Card Industry Data Security Standard
33
What is the Payment Card Industry Data Security Standard (PCI DSS)?
An international security standard meant to ensure that organisations storing, accepting, processing, and transmitting credit card information do so in a secure environment
34
What is the aim of the Payment Card Industry Data Security Standard (PCI DSS)?
To reduce credit card fraud
35
What does HIPAA stand for?
The Health Insurance Portability and Accountability Act
36
What is the Health Insurance Portability and Accountability Act (HIPAA)?
A U.S. federal law established to protect patients' health information
37
When was HIPAA established?
1996
38
What three rules is HIPAA governed by?
1. Privacy 2. Security 3. Breach notification
39
What does HITRUST stand for?
Health Information Trust Alliance
40
What is the Health Information Trust Alliance (HITRUST)?
A security framework and assurance program that helps institutions meet HIPAA compliance
41
What is the name of a security framework and assurance program that helps institutions meet HIPAA compliance?
Health Information Trust Alliance (HITRUST)
42
What does ISO stand for?
International Organization for Standardization
43
Why was the International Organization for Standardization (ISO) created?
- To establish international standards related to technology, manufacturing, and management across borders - To help organisations improve their processes and procedures for staff retention, planning, waste, and services
44
Who developed the System and Organizations Controls (SOC type 1, SOC type 2)?
The American Institute of Certified Public Accountants (AICPA) auditing standards board.
45
What are the System and Organizations Controls (SOC type 1, SOC type 2)?
A series of reports that focus on an organisation's user access policies at different organisational levels
46
What are the System and Organizations Controls (SOC type 1, SOC type 2) used for?
Used to assess an organisation's financial compliance and levels of risk. They also cover: - Confidentiality - Privacy - Integrity - Security - Overall data safety
47
When was the United States Presidential Executive Order 14028 released?
May 12th, 2021, by President Joe Biden
48
What are Security Ethics?
Guidelines for making appropriate decisions as a security professional.
49
What is the name given to guidelines for making appropriate decisions as a security professional?
Security Ethics
50
What are ethical principles in security?
- Confidentiality - Privacy protections - Laws
51
What are Laws?
Rules that are recognised by a community and enforced by a governing entity.
52
What is the name given to rules that are recognised by a community and enforced by a governing entity?
Laws
53
What is the name given to a person who is not a member of law enforcement who decides to stop a crime on their own.
Vigilante
54
What is a Vigilante?
A person who is not a member of law enforcement who decides to stop a crime on their own.
55
According to the International Court of Justice (ICJ), a person or group can deploy a counterattack if:
The counterattack... - Will only affect the party that attacked first - Is a direct communication asking the initial attacker to stop - Does not escalate the situation - Effects can be reversed
56
What does ICJ stand for?
International Court of Justice
57
Explain "Confidentiality" in relation to ethics
Relating to ethics, confidentiality means that there needs to be a high level of respect for privacy to safeguard private assets and data.
58
What is Privacy Protection?
Safeguarding personal information from unauthorised use.
59
What is the name given to safeguarding personal information from unauthorised use?
Privacy Protection
60
Explain Privacy Protection in relation to ethics
Security professionals hold an ethical obligation to - secure private information - identify security vulnerabilities - manage organisational risks - align security with business goals
61
Explain Laws in relation to ethics
Security professionals have an ethical obligation to protect their organisation, its internal infrastructure, and the people within the organisation.
62
Whay must security professionals do to fulfil their ethical responsibilities in relation to Laws?
- Remain unbiased and conduct work honestly, responsibly, and with the highest respect for the law. - Be transparent and just, and rely on evidence. - Ensure they are consistently invested in the work they are doing in order to appropriately and ethically address issues that arise. - Stay informed and strive to advance their skills so they can contribute to the betterment of the cyber landscape