Play it safe: Manage security risks Flashcards

(53 cards)

1
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business Continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External Threat

A

Anything outside the organization that has the potential to harm organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk

A

Anything that can impact the confidentiality, integrity, or availability of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability

A

A weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attack Vectors

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authorization

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Availability

A

The idea that data is accessible to those who are authorized to access it

23
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s identity

24
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

25
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
26
Detect
A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections
27
Encryption
The process of converting data from a readable format to an encoded format
28
Identify
A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets
29
Integrity
The idea that the data is correct, authentic, and reliable
30
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
31
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53
A unified framework for protecting the security of information systems within the U.S. federal government
32
Open Web Application Security Project/Open Worldwide Application Security Project (OWASP)
A non-profit organization focused on improving software security
33
Protect
A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats
34
Recover
A NIST core function related to returning affected systems back to normal operation
35
Respond
A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process
36
Risk
Anything that can impact the confidentiality, integrity, or availability of an asset
37
Security audit
A review of an organization's security controls, policies, and procedures against a set of expectations
38
Security controls
Safeguards designed to reduce specific security risks
39
Security frameworks
Guidelines used for building plans to help mitigate risk and threats to data and privacy
40
Security posture
An organization’s ability to manage its defense of critical assets and data and react to change
41
Threat
Any circumstance or event that can negatively impact assets
42
Chronicle
A cloud-native tool designed to retain, analyze, and search data
43
Incident response
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach
44
Log
A record of events that occur within an organization’s systems
45
Metrics
Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application
46
Operating system (OS)
The interface between computer hardware and the user
47
Playbook
A manual that provides details about any operational action
48
Security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization
49
Security orchestration, automation, and response (SOAR)
A collection of applications, tools, and workflows that use automation to respond to security events
50
SIEM tools
A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations
51
Splunk Cloud
A cloud-hosted tool used to collect, search, and monitor log data
52
Splunk Enterprise
A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time
53
Incident response
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach