Play It Safe: Manage Security Risks Flashcards

(39 cards)

1
Q

Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor

A

Name the steps of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External threat

A

Anything outside the organization that has the potential to harm organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify, protect, detect, respond, and recover.

A

What are the five core functions of NIST CSF?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open Worldwide Application Security Project

A

What does OWASP stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Minimize attack surface area, Principle of least privilege, Defense in depth, Separation of duties, Keep security simple, and Fix security issues correctly.

A

What is OWASP’s security principles?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations.

16
Q

List the audit checklist

A

Identify the scope of the audit, Complete a risk assessment, Conduct the audit, Create a mitigation plan, and Communicate results to stakeholders.

17
Q

Attack vectors

A

The pathways attackers use to penetrate security defenses.

18
Q

Authentication

A

The process of verifying who someone is.

19
Q

Authorization

A

The concept of granting access to specific resources in a system.

20
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s identity.

21
Q

Detect

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.

22
Q

Encryption

A

The process of converting data from a readable format to an encoded format.

23
Q

Identify

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets.

24
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53
A unified framework for protecting the security of information systems within the U.S. federal government.
25
Open Worldwide Application Security Project (OWASP)
A non-profit organization focused on improving software security.
26
Protect
A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats.
27
Recover
A NIST core function related to returning affected systems back to normal operation.
28
Respond
A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process.
29
What does SOAR stand for?
Security orchestration, automation, and response
30
Security orchestration, automation, and response (SOAR)
A collection of applications, tools, and workflows that uses automation to respond to security events.
31
Chronicle
A cloud-native tool designed to retain, analyze, and search data.
32
Incident response
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.
33
Metrics
Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application.
34
SIEM tools
A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations.
35
Splunk Cloud
A cloud-hosted tool used to collect, search, and monitor log data.
36
Splunk Enterprise
A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time.
37
Risk
Anything that can impact the confidentiality, integrity, or availability of an asset.
38
Vulnerability
A weakness that can be exploited by a threat.