Play it Safe: Manage Security Risks Flashcards

(49 cards)

1
Q

What does ‘Assess’ mean in the context of the NIST RMF?

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an ‘Asset’?

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ‘Attack vectors’?

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ‘Authentication’?

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘Authorization’ refer to?

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘Authorize’ mean in the context of the NIST RMF?

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ‘Availability’?

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are biometrics?

A

The unique physical characteristics that can be used to verify a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is business continuity?

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the second step of the NIST RMF?

A

Categorize: It is used to develop risk management processes and tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Chronicle?

A

A cloud-native tool designed to retain, analyze, and search data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does confidentiality mean?

A

The idea that only authorized users can access specific assets or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the CIA triad?

A

A model that helps inform how organizations consider risk when setting up systems and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does detect mean in the context of NIST?

A

A core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encryption?

A

The process of converting data from a readable format to an encoded format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an external threat?

A

Anything outside the organization that has the potential to harm organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Identify function in the NIST Cybersecurity Framework?

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Implement mean in the NIST Risk Management Framework (RMF)?

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is incident response?

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does integrity refer to in cybersecurity?

A

The idea that the data is correct, authentic, and reliable

21
Q

What is an internal threat?

A

A current or former employee, external vendor, or trusted partner who poses a security risk

22
Q

What is a log in the context of cybersecurity?

A

A record of events that occur within an organization’s systems

23
Q

What are metrics in software performance assessment?

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

24
Q

What does Monitor mean in the NIST RMF?

A

The seventh step of the NIST RMF that means be aware of how systems are operating

25
What is the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
26
What is NIST Special Publication (S.P.) 800-53?
A unified framework for protecting the security of information systems within the U.S. federal government
27
What is OWASP?
A non-profit organization focused on improving software security.
28
What is an operating system (OS)?
The interface between computer hardware and the user.
29
What is a playbook?
A manual that provides details about any operational action.
30
What does 'Prepare' refer to in the NIST RMF?
The first step related to activities necessary to manage security and privacy risks before a breach occurs.
31
What does 'Protect' mean in the NIST core functions?
To protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats.
32
What is ransomware?
A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.
33
What does 'Recover' refer to in the NIST core functions?
Related to returning affected systems back to normal operation.
34
What does 'Respond' mean in the NIST core functions?
Related to ensuring that proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process.
35
What is risk?
Anything that can impact the confidentiality, integrity, or availability of an asset.
36
What is risk mitigation?
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.
37
What is a security audit?
A review of an organization's security controls, policies, and procedures against a set of expectations.
38
What are security controls?
Safeguards designed to reduce specific security risks.
39
What are security frameworks?
Guidelines used for building plans to help mitigate risk and threats to data and privacy.
40
What is security information and event management (SIEM)?
An application that collects and analyzes log data to monitor critical activities in an organization.
41
What is security orchestration, automation, and response (SOAR)?
A collection of applications, tools, and workflows that use automation to respond to security events.
42
What is security posture?
An organization’s ability to manage its defense of critical assets and data and react to change.
43
What does 'Select' refer to in the NIST RMF?
The third step that means to choose, customize, and capture documentation of the controls that protect an organization.
44
What is shared responsibility?
The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
45
What is social engineering?
A manipulation technique that exploits human error to gain private information, access, or valuables.
46
What is Splunk Cloud?
A cloud-hosted tool used to collect, search, and monitor log data.
47
What is Splunk Enterprise?
A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time.
48
What is a threat?
Any circumstance or event that can negatively impact assets
49
What is a vulnerability?
A weakness that can be exploited by a threat