Risk Management and NIST RMF Flashcards
(44 cards)
What is the 5th step of the NIST RMF
Assess:
to determine if established controls are implemented correctly
What is the 6th Step of the NIST RMF?
Authorize:
being accountable for the security and privacy risks that may exist in an organization
What is Business continuity?
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
What is the 2nd Step of the NIST RMF?
Categorize:
used to develop risk management processes and tasks
What is an External threat?
Anything outside the organization that has the potential to harm organizational assets
What is the 4th step of the NIST RMF?
Implement:
to implement security and privacy plans for an organization
What is an Internal threat?
A current or former employee, external vendor, or trusted partner who poses a security risk
What is the 7th step of the NIST RMF?
Monitor: that means be aware of how systems are operating
What is the 1st step of the NIST RMF?
Prepare: related to activities that are necessary to manage security and privacy risks before a breach occurs
What is Ransomware?
A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access
What is Risk?
Anything that can impact the confidentiality, integrity, or availability of an asset
What is Risk mitigation?
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
What is Security posture?
An organization’s ability to manage its defence of critical assets and data and react to change
What is the 3rd step of NIST RMF?
Select: means to choose, customize, and capture documentation of the controls that protect an organization
What is meant by Shared responsibility?
The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security
What is Social engineering?
A manipulation technique that exploits human error to gain private information, access, or valuables
What is a Vulnerability?
A weakness that can be exploited by a threat
What are the 7 steps in the NIST RMF?
1.Prepare
2. Categorise
3. Select
4. Implement
5. Assess
6. Authorise
7. Monitor
What does NIST RMF mean?
National Institute of Standards and Technology- Risk Management Framework
Which of the following is the first step in the NIST Risk Management Framework (RMF)?
(a) Prepare
(b) Categorize
(c) Select
(d) Implement
a- Prepare
What is the purpose of the “select” step in the RMF?
(a) To develop risk management processes and tasks
(b) To choose, customize, and capture documentation of controls
(c) To implement security and privacy plans
(d) To determine if established controls are implemented correctly
(b) To choose, customize, and capture documentation of controls
Which of the following is NOT a task that an entry-level security analyst may perform as part of the RMF?
(a) Monitoring for risks
(b) Developing plans of action
(c) Generating reports
(d) Establishing project milestones
(b) Developing plans of action
The RMF is only used by security professionals with advanced experience. (True/False)
False
The “monitor” step in the RMF involves assessing and maintaining technical operations. (True/False)
True