Play it safe: Manage Security Risks Flashcards

1
Q

The fifth step of the NIST RMF that means to* determine if established controls are implemented correctly*

A

Assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization

A

Authorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

A

Business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The second step of the NIST RMF that is used to develop risk management processes and tasks

A

Categorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anything outside the organization that has the potential to harm organizational assets

A

External threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

A

Implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A current or former employee, external vendor, or trusted partner who poses a security risk

A

Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The seventh step of the NIST RMF that means be aware of how systems are operating

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

A

Prepare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anything that can impact the confidentiality, integrity, or availability of an asset

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization’s ability to manage its defense of critical assets and data and react to change

A

Security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

A

Select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

A

Shared responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A manipulation technique that exploits human error to gain private information, access, or valuables

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A weakness that can be exploited by a threat

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CISSP

A

Certified information systems security professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CISSP 8 Domains

A
    • Security and Risk management
  1. Asset Management,
  2. Security Archetecture & Engineering,
  3. Communications & Network Security,
  4. Idenity & Access Management,
  5. Security Assessment & Testing,
  6. Security Operations,
  7. Software Development security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An item perceived as having value to an organization

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The pathways attackers use to penetrate security defenses

A

Attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The process of verifying who someone is

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The concept of granting access to specific resources in a system

A

Authorization

24
Q

The idea that data is accessible to those who are authorized to access it

A

Availability

25
Q

The unique physical characteristics that can be used to verify a person’s identity

A

Biometrics

26
Q

The idea that only authorized users can access specific assets or data

A

Confidentiality

27
Q

A model that helps inform how organizations consider risk when setting up systems and security policies

A

Confidentiality, integrity, availability (CIA) triad

28
Q

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections

A

Detect

29
Q

The process of converting data from a readable format to an encoded format

A

Encryption

30
Q

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets

A

Identify

31
Q

The idea that the data is correct, authentic, and reliable

A

Integrity

32
Q

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

A

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

33
Q

A unified framework for protecting the security of information systems within the U.S. federal government

A

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53

34
Q

A non-profit organization focused on improving software security

A

Open Web Application Security Project/Open Worldwide Application Security Project (OWASP

35
Q

A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats

A

Protect

36
Q

A NIST core function related to returning affected systems back to normal operation

A

Recover

37
Q

A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

A

Respond

38
Q

Anything that can impact the confidentiality, integrity, or availability of an asset

A

Risk

39
Q

A review of an organization’s security controls, policies, and procedures against a set of expectations

A

Security audit

40
Q

Safeguards designed to reduce specific security risks

A

Security controls

41
Q

Guidelines used for building plans to help mitigate risk and threats to data and privacy

A

Security frameworks

42
Q

An organization’s ability to manage its defense of critical assets and data and react to change

A

Security posture

43
Q

Any circumstance or event that can negatively impact assets

A

Threat

44
Q

A cloud-native tool designed to retain, analyze, and search data

A

Chronicle

45
Q

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

A

Incident response

46
Q

A record of events that occur within an organization’s systems

A

Log

47
Q

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

A

Metrics

48
Q

The interface between computer hardware and the user

A

Operating system (OS)

49
Q

A manual that provides details about any operational action

A

Playbook

50
Q

An application that collects and analyzes log data to monitor critical activities in an organization

A

Security information and event management (SIEM)

51
Q

A collection of applications, tools, and workflows that use automation to respond to security events

A

Security orchestration, automation, and response (SOAR

52
Q

A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations

A

SIEM tools

53
Q

A cloud-hosted tool used to collect, search, and monitor log data

A

Splunk Cloud

54
Q

A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time

A

Splunk Enterprise

55
Q

A manual that provides details about any operational action.

A

Playbook

56
Q

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

A

Incident response