1A: Compare and Contrast Information Security Roles Flashcards
Any external responsibility for an organization’s security lies mainly with which individuals?
Senior Executives
Which security related phrase relates to the integrity of data?
Modification
An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the “detect” function, what does the engineer focus on?
Ongoing proactive monitoring
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “respond” function?
Identify, analyze, and eradicate threats
What is the CIA Triad?
Confidentiality, Integrity, Availability
What is condifentiality?
certain information should only be known to certain people.
What is Integrity?
data is stored and transferred as intended and that modification is only done by authorized sources.
What is availability?
information is accessible to those authorized to view or modify it.
What is non-repudiation?
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.
a subject cannot deny doing something, such as creating, modifying, or sending a resource.
Ex. Something is witnessed, witness can provide evidence
What are the 5 Functions of security developed by NIST?
Identify
Protect
Detect
Respond
Recover
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “identify” function?
develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “protect” function?
procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operations life cycle.
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “recover” function?
implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.
What are some of the basic responsibilities of someone in IT?
-Participate in risk assessments and testing of security systems and make recommendations.
-Specify, source, install, and configure secure devices and software.
-Set up and maintain document access control and user privilege profiles.
-Monitor audit logs, review user privileges, and document access controls.
-Manage security-related incident response and reporting.
-Create and test business continuity and disaster recovery plans and procedures.
-Participate in security training and education programs.
Who is in charge of overall internal responsibility for Security?
Director of Security, Chief Security Officer (CSO), Chief Information Security Officer (CISO)