.02 RG Vocab Information Security & Risk Management Flashcards
Confidentiality
preserves authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary information.
Integrity
guards against improper information modification or destruction, ensuring
information nonrepudiation and authenticity.
Availability
ensures timely and reliable access to and use of information.
NIST Identify
Asset management, business environment, governance, risk assessment,
risk management strategy
NIST Protect
Access control, awareness training, data security, information protection
processes and procedures, maintenance, protective technology
NIST Detect
Anomalies and events, security continuous monitoring, detection processes
NIST Respond
Response planning, communications, analysis, mitigation, improvements
NIST Recover
Recovery planning, improvements, communications
RML Categorize
Classify the system and information processed, stored, and transmitted based
on impact analysis
RML Focus 1
Inform organizational risk management processes and tasks by determining the
adverse impact on organizational operations and assets, individuals, other organizations, and
the nation concerning the loss of confidentiality, integrity, and availability of organizational
systems and the information processed, stored, and transmitted by those systems.
RML Select
Choose an initial set of controls for the system and tailor the controls as needed to
reduce risk to an acceptable level based on an assessment of risk.
RML Focus 2
Select, tailor, and document the controls necessary to protect the information system
and organization commensurate with the risk to organizational operations and assets,
individuals, other organizations, and the nation.
RML Implement
: Identify and activate the necessary controls and describe how they are
employed within the system and its operating environment
RML Focus 3
Initiate the controls in the security and privacy plans for the system and the
organization and document the specific details of the control implementation in a baseline
configuration.
RML Assess
: Evaluate the controls to determine if they are implemented correctly, operating as
intended, and producing the desired outcomes concerning satisfying the security and privacy
requirements.
RML Focus 4
Determine if the controls selected for implementation are implemented correctly,
operating as intended, and producing the desired outcome concerning meeting the security
and privacy requirements for the system and the organization.
RML Authorize
Certify and enable the system or common controls based on determining that
the risk to organizational operations and assets, individuals, other organizations, and the
nation is acceptable.
RML Focus 5
Provide organizational accountability by requiring a senior management official to
determine if the security and privacy risk (including risk to the supply chain) to organizational
operations and assets, individuals, other organizations, or the nation based on the operation
of a system or the use of common controls is acceptable.
Monitor
Observe the system and the associated controls on an ongoing basis, including
assessing control effectiveness, documenting changes to the system and environment of
operation, conducting risk assessments and impact analyses, and reporting the security and
privacy posture of the system.
RML Focus 6
Maintain an ongoing situational awareness about the security and privacy posture of
the information system and the organization in support of risk management decisions.
Incident
is a security event that compromises an information asset’s integrity, confidentiality,
or availability.
Breach
is an incident that results in the confirmed disclosure—not just potential
exposure—of data to an unauthorized party.
Assets
depend on the type of organization; for example, a bank’s asset is its money while the
assets of a software company are in its computer code
Vulnerabilities
exist in both software and hardware. The discovery of such vulnerabilities is
only a matter of time.
Exploitation
is the sse of a vulnerability to gain access to an organization.
Risk
is the level of impact on organizational operations (including mission, functions, image,
or reputation), organizational assets, or individuals resulting from the operation of an
information system, given the potential impact of a threat and the likelihood of that threat
occurring.
Threat
is any circumstance or event that can adversely impact organizational operations
(including mission, functions, image, or reputation), organizational assets, or individuals
through an information system via unauthorized access, destruction, disclosure, modification
of information, and denial of service; also, the potential for a threat source to successfully
exploit a particular information system vulnerability.
Pen-test
also known as penetration testing, is the method of employing hacker tools and
techniques to evaluate security and implemented controls. Another way of understanding a
pen test is to discover both known and unknown vulnerabilities.
Confidentiality
preserves authorized restrictions on information access and disclosure,
including the means of protecting personal privacy and proprietary information.
Integrity
guards against improper information modification or destruction, including
ensuring information nonrepudiation and authenticity.
Availability
ensures timely and reliable access to and use of information