Play It Safe: Manage Security Risks Flashcards
(39 cards)
Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor
Name the steps of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in order
Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.
Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.
Business continuity
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.
Categorize
The second step of the NIST RMF that is used to develop risk management processes and tasks.
External threat
Anything outside the organization that has the potential to harm organizational assets.
Implement
The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.
Monitor
The seventh step of the NIST RMF that means be aware of how systems are operating.
Prepare
The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.
Risk mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.
Select
The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.
Shared responsibility
The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
Identify, protect, detect, respond, and recover.
What are the five core functions of NIST CSF?
Open Worldwide Application Security Project
What does OWASP stand for?
Minimize attack surface area, Principle of least privilege, Defense in depth, Separation of duties, Keep security simple, and Fix security issues correctly.
What is OWASP’s security principles?
Security audit
A review of an organization’s security controls, policies, and procedures against a set of expectations.
List the audit checklist
Identify the scope of the audit, Complete a risk assessment, Conduct the audit, Create a mitigation plan, and Communicate results to stakeholders.
Attack vectors
The pathways attackers use to penetrate security defenses.
Authentication
The process of verifying who someone is.
Authorization
The concept of granting access to specific resources in a system.
Biometrics
The unique physical characteristics that can be used to verify a person’s identity.
Detect
A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.
Encryption
The process of converting data from a readable format to an encoded format.
Identify
A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets.