WEEK 3 Flashcards

SLIDES

1
Q

Priorities for Compliance

A
  1. Protect the organization’s data
    • Know how it is used, created, processed, stored
  2. Know the compliance and regulatory requirements
  3. Keep up to date on changing requirements
  4. Incidents will happen – get used to it
    • Understand what happened
    • Identify the root cause
    • Develop remediation and prevent recurrence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do I position my security

program for success?

A

CIA

  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why did NIST Cybersecurity Framework (CSF) design?

A

designed for individual businesses and other organizations TO USE TO ASSESS RISKS THEY FACE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Framework (CSF) IS DIVIDED INTO?

A

divided into:
• framework core
• implementation tiers
• framework profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity Framework (CSF) The

FRAMEWORK CORE

describes 5 functions of an information security program:

A
  • identify
  • protect
  • detect
  • respond
  • recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIST Cybersecurity Framework (CSF)

IMPLEMENTATION TIERS

defines four implementation tiers:

A
  • partial
  • risk-informed
  • repeatable
  • adaptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST Cybersecurity Framework (CSF)

PROFILE

A

An organization:
• typically starts by using the framework to develop a Current Profile
• describes its cybersecurity activities
• what outcomes it is achieving
• then develops a Target Profile
• or adopts a baseline profile tailored to its sector (e.g. infrastructure industry)
• or type of organization
• then define steps switch from its current profile to its target profile
• recommends creating a current state and target state profile
• based on the analysis of the organization’s alignment with the
CSF core
• profiles will guide the organization’s efforts to improve its cyber
security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST Cybersecurity Framework vs NIST 800-53

A

Framework is:
• concise
• voluntary in nature (It’s your choice whether you want to implement in your organization or not. NIST 800-53 is mandatory)
• builds on existing frameworks

-Framework is more high-level in its scope compared to existing frameworks like NIST 800-53 (More suitable to be read by CEOs and C-suite member because it is not technical).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F

Cybersecurity Framework Does not provide how or how much cybersecurity is appropriate

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Profile Can be Created from Three Types of Information

A

Business Objectives
Cybersecurity Requirements
Technical Environment (Threats Vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Framework Seven Step Process

A

• Step 1: Prioritize and Scope
• Implementation Tiers may be used to express varying risk
tolerances1.1
• Step 2: Orient
• Step 3: Create a Current Profile
• Step 4: Conduct a Risk Assessment
• Step 5: Create a Target Profile
• When used in conjunction with an Implementation Tier, characteristics
of the Tier level should be reflected in the desired cybersecurity
outcomes1.1
• Step 6: Determine, Analyze, and Prioritize Gaps
• Step 7: Implementation Action Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Technology Should I

Use?

A

Based on the following three things:

Regulations
• State, federal, industry-specific
• Typically based on data

Policies
• Organizational rules (internal)

Controls
• Security Controls
• Operational Controls
• Verify you meet the requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why would you be non-compliant?

A
  • Control may not apply
  • Technology not feasible
  • Too expensive
  • Control not required due to other controls/processes
  • Organization chose to accept the risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compliance Management

Guidelines

A
  1. Employ a governance structure
  2. Assess all compliance activities
  3. Architect cross-functional controls
  4. Architect a data classification program
  5. Know your compliance regulations
  6. Manage compliance at the highest level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are the brand new CISO, you’ve been onboard for 1 month and your organization just suffered a major data breach. You don’t have a response plan. What do you do?

A

Manage communications through your PR department with GC input, consult with legal, tell people not to post on Social sites, Start documenting what you’re doing for next time,Establish an emergency action group, speak with the board members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the The CIA Model

A

Confidentiality: The data are not available to those who
do not have authorization

Integrity: The data are what they are supposed to be

Availability: The data can be accessed by those who
have authorization, when they need the access

17
Q

Why do Information Security programs fail?

A

Information Security: Concerned with protection of data
Organizations fail because they either:

1) Don’t take their mission seriously – lack of due
diligence
2) Try to protect ALL data equally – get overwhelmed
3) General lack of understanding in senior level C-suiters

There was a time when installing an anti-virus was enough for a computer. BUT time has changed, anti-virus is not enough. That’s why we have this course at GWU.