Chapter 2 Flashcards

1
Q

Formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards.

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging.

A

Accreditation Boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For the purposes of identifying the protection level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.

A

Accreditation Boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Product comprised of a system security plan (SSP) and a report documenting the basis for the accreditation decision.

A

Accreditation Package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The designated accrediting authority (DAA)

A

Accrediting Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack on the authentication protocol where the attack transmits data to a claimant, credential service provider, verifier, or relaying party.

A

Active Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of this attack include MitM, impersonation, and session hijacking.

A

Active Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e,g., cyber, physical, and deception) to achieve its objectives.

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Its objectives are typically to establish and extend footholds within the information technology infrastructure of organizations in order to continually exfiltrate information and/or to undermine or impede critical aspects of a mission, program, or organization, or place itself in a position to do so in the future.

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pursues its objectives repeatedly over an extended period of time, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.

A

Adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A branching hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specific way.

A

Attack Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensuring timely and reliable access to and use of information.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Timely, reliable access to data and information services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.

A

Blue Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Must defend against real or simulated attacks (i) over a significant period of time, (ii) in a representative operational context (e.g., as part of an operational exercise), and (iii) according to rules established and monitored with the help of a neutral group refereeing the simulation or exercise.

A

Blue Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A security control that is inherited by one or more organizational information systems.

A

Common Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organizational official responsible for the development, implementation, assessment, and monitoring of common controls.

A

Common Control Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The security controls employed in lieu of the recommended controls in the security control baselines described in NIST SP 800-53 and CNSS Instruction 1253 that provide equivalent or comparable protection for an information system or organization.

A

Compensating Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Disclosure to information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Disclosure of classified data to persons not authorized to receive that data.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred.

A

Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Process of controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications prior to, during, and after system implementation.

A

Configuration Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Maintaining ongoing awareness to support organizational risk decisions.

A

Continuous Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.

A

Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A time-phased or situation-dependent combination of risk response measures.

A

Course of Action (COA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Actions taken through the use of an information system or network that result in an actual or potentially adverse effect on an information system, network, and/or the information residing therein.

A

Cyber Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The prevention of authorized access to resources or the delaying of time-critical operations.

A

Denial of Service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risk and performance.

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

May consist of all or some of the following business aspects: acquisition, program management, financial management, human resources, security, and information systems, information, and mission management.

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A strategic asset baseline that defines the mission, the information necessary to perform them mission, and the transitional process for implementing new technologies in response to changing mission needs.

A

Enterprise Architecture (EA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Includes a baseline architecture, target architecture, and sequencing plan.

A

Enterprise Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The methods and processes used by an enterprise to manage risks to its mission and to establish the trust necessary for the enterprise to support shared missions.

A

Enterprise Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Involves the identification of mission dependencies on enterprise capabilities, the identification and prioritization of risks due to defined threats, the implementation of countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and it assesses enterprise performance against threats and adjusts countermeasures as necessary.

A

Enterprise Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An observable occurrence in a network or system.

A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Unauthorized user who attempts or gains access to an information system.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The loss of confidentiality, integrity, or availability that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.

A

High Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Causes one or more of the following: (i) causes a severe degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced, (ii) results in major damage to organizational assets, (iii) results in major financial loss, and (iv) results in severe or catastrophic harm to individuals involving loss of life or serious life threating injuries.

A

High Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS PUB 199 potential impact value of high.

A

High-impact System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The effect on organizational operations, organizational assets, individuals, other organizations, or the Nation of a loss of confidentiality, integrity, or availability of information or an information system.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure, unauthorized modification, unauthorized destruction, or loss of information or information system availability.

A

Impact Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An occurrence that results in actual or potential jeopardy to the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security policies, or acceptable use policies.

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The mitigation of violations of security policies and recommended practices.

A

Incident Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The mitigation of violations of security practices and recommended practices.

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Facts and ideas, which can be represented (encoded) as various forms of data.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Knowledge–e.g., data, instructions–in any medium or form that can be communicated between system entities.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A process to: (i) define an ISCM strategy, (ii) establish an ISCM program, (iii) implement an ISCM program, (iv) analyze data and report findings, (v) respond to findings, and (vi) review and update the ISCM strategy and program.

A

Information Security Continuous Monitoring (ISCM) Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The risk to organizational operations, organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems.

A

Information Security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A qualitative measure of the importance of the information based upon factors such as the level of robustness of the information assurance (IA) controls allocated to the protection of information.

A

Information Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or resource without having authorization to do so.

A

Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Causes one or more of the following: (i) causes a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced, (ii) results in minor damage to organizational assets, (iii) results in minor financial loss, and (iv) results in minor harm to individuals.

A

Low Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The loss of confidentiality, integrity, or availability that could be expected to have a limited adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.

A

Low Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Elements of organizations describing mission areas, common/shared business services, and organization-wide services.

A

Mission/Business Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Can be identified with one or more information systems that collectively support a mission/business process.

A

Mission/Business Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Causes one or more of the following: (i) causes a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced, (ii) results in significant damage to organizational assets, (iii) results in significant financial loss, and (iv) results in significant harm to individuals that does not involve loss of life or serious life-threatening injuries.

A

Moderate Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The loss of confidentiality, integrity, or availability that could be expected to have a serious adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.

A

Moderate Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS PUB 199 potential impact value of moderate and no security objective is assigned a FIPS PUB 199 potential impact value of high.

A

Moderate-impact System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

An attack that does not alter systems or data.

A

Passive Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The loss of confidentiality, integrity, or availability that could be expected to have a limited (low), serious (moderate), or a severe or catastrophic (high) adverse effect on organizational operations, organizational assets, or individuals.

A

Potential Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A right granted to an individual, program, or process.

A

Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A group of people authorized an organized to emulate potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Objective is to improve enterprise cybersecurity by demonstrating the impacts to successful attacks and by demonstrating what works for defenders (i.e., Blue Team) in an operational environment.

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

The act or mitigating a vulnerability or a threat.

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Portion of risk remaining after security measures have been applied.

A

Residual Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A measure of the extent to which an entity is threatened by a potential circumstance or event.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A function of: (i) the adverse impacts that would arise if the circumstance or event occurs, and (ii) the likelihood of occurrence.

A

Risk

70
Q

The process of identifying, estimating, and prioritizing risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation that would results from the operation of an information system.

A

Risk Assessment

71
Q

Incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place.

A

Risk Assessment

72
Q

Report that contains the results of performing a risk assessment or the formal output from the process of assessing risk.

A

Risk Assessment Report (RAR)

73
Q

The individual, group, or organization responsible for conducting a risk assessment.

A

Risk Assessor

74
Q

An individual or group within an organization that helps to ensure that (i) security risk-related considerations for individual information systems, to include the authorization decisions for those systems, are viewed from an organization-wide perspective with regard to the overall strategic goals and objectives of the organization in carrying out its missions and business functions; and (ii) risk management form individual information systems is consistent across organization, reflects organizational risk tolerance, and is considered along with other organizational risks affecting mission/business success.

A

Risk Executive (Function)

75
Q

The program and supporting processes to manage information security risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.

A

Risk Management

76
Q

Includes (i) establishing the context for risk-related activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.

A

Risk Management

77
Q

A structure approach used to oversee and manage risk for an enterprise.

A

Risk Management Framework (RMF)

78
Q

Prioritizing, evaluating, and implementing the appropriate risk-reducing controls/countermeasures recommended for the risk management process.

A

Risk Mitigation

79
Q

Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations, organizational assets, individuals, other organizations, or the Nation.

A

Risk Response

80
Q

The level of risk an entity is willing to assume in order to achieve a potential desired result.

A

Risk Tolerance

81
Q

Provides a disciplined and structured approach for documenting the findings of the assessor and the recommendations for correcting an identified vulnerabilities in the security controls.

A

Security Assessment Report (SAR)

82
Q

Documents the results of the security control assessment and provides the authorizing official with essential information needed to make a risk-based decision on whether to authorize operation of an information system or a designated set of common controls.

A

Security Authorization Package

83
Q

Contains: (i) the security plan; (ii) the security assessment report (SAR); and (iii) the plan of action and milestones.

A

Security Authorization Package

84
Q

The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, individuals, other organizations, and the Nation.

A

Security Category

85
Q

The process of determining the security category for information or an information system.

A

Security Categorization

86
Q

Methodologies are described in CNSS Instruction 1253 for national security systems and in FIPS PUB 199 for other than national security systems.

A

Security Categorization

87
Q

Formal document that provides an overview of the security requirements for an information system or an information security program and describes the security controls in place or planned for meeting those requirements.

A

Security Plan

88
Q

A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.

A

Sensitivity

89
Q

Formal document that provides and overview of the security requirements for an information system and describes the security controls in place or planned to meeting those requirements

A

System Security Plan (SSP)

90
Q

Any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through an information security system via unauthorized access, destruction, disclosure, modification or information, and/or denial of service.

A

Threat

91
Q

Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.

A

Threat Assessment

92
Q

The intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally exploit a vulnerability.

A

Threat Source

93
Q

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

A

Vulnerability

94
Q

Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data to help predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.

A

Vulnerability Assessment

95
Q

Risk that occurs at a strategic level.

A

Organizational Risk

96
Q

Organization-wide information security programs, policies, procedures, and guidance.

A

Organizational Risk Example

97
Q

The types of appropriate risk countermeasures.

A

Organizational Risk Example

98
Q

Investment decisions for information technologies/systems.

A

Organizational Risk Example

99
Q

Procurements

A

Organizational Risk Example

100
Q

Minimum organization-wide security controls.

A

Organizational Risk Example

101
Q

Conformance to enterprise/security architectures.

A

Organizational Risk Example

102
Q

Monitoring strategies and ongoing authorizations of information systems and common controls.

A

Organizational Risk Example

103
Q

An example of a common organization-wide documentation; the security policies and procedures for an organization.

A

Dash-1 Security Controls

104
Q

Provides a repeatable process designed to promote the protection of information and information systems commensurate with risk.

A

Risk Management Framework (RMF)

105
Q

Emphasizes organization-wide preparation necessary to manage security and privacy risks.

A

Risk Management Framework (RMF)

106
Q

Facilitates the categorization of information and systems, the selection, implementation, assessment, and monitoring of controls, and the authorization of information systems and common controls.

A

Risk Management Framework (RMF)

107
Q

Promotes the use of automation for near real-time risk management and ongoing system and control authorization through the implementation of continuous monitoring processes.

A

Risk Management Framework (RMF)

108
Q

Encourages the use of correct and timely metrics to provide senior leaders and managers with the necessary information to make cost-effective, risk-based decisions for information systems supporting their missions and business functions.

A

Risk Management Framework (RMF)

109
Q

Facilitates the integration of security and privacy requirements and controls into enterprise architecture, SDLC, acquisition processes, and system engineering processes.

A

Risk Management Framework (RMF)

110
Q

Connects risk management processes at the organization and mission or business process levels to risk management processes at the information system level though a senior accountable official for risk management and risk executive function.

A

Risk Management Framework (RMF)

111
Q

Establishes responsibility and accountability for controls implemented within information systems and inherited by those systems.

A

Risk Management Framework (RMF)

112
Q

Steps include: (i) prepare, (ii) categorize, (iii) select, (iv) implement, (v) assess, (vi) authorize, and (vii) monitor.

A

RMF

113
Q

Establishes the scope of protection for an information system.

A

Authorization Boundary

114
Q

Security and privacy requirements and risks identified by the organization, lead to the need for security and privacy controls to respond to the risk.

A

Derived Requirements

115
Q

Commonly addressed by putting in place organization-wide or company-wide security policies, processes, and standard operating procedures.

A

Organizational Risk

116
Q

The security-relevant risk for a particular business unit within an organization.

A

Mission and Business Risk

117
Q

Design decisions: (i) selection, tailoring, and supplementation of security controls, and (ii) selection of information technology products for organizational information systems.

A

Information System Risk Example

118
Q

Implementation decisions: whether specific information technology products or product configurations meet security control requirements.

A

Information System Risk Example

119
Q

Operational decisions: (i) level of monitoring activity, and (ii) frequency of ongoing information system authorizations.

A

Information System Risk Example

120
Q

The characteristics of the system are described and documented.

A

RMF Categorize Task

121
Q

A security categorization of the system, including the information processed by the system represented by the organization-identified information types, is completed.

A

RMF Categorize Task

122
Q

The security categorization results are reviewed, and the categorization decision is approved by senior leaders in the organization.

A

RMF Categorize Task

123
Q

{(confidentiality, impact), (integrity, impact), (availability, impact)}, where the acceptable values for potential impact are LOW, MODERATE, and HIGH.

A

System Categorization

124
Q

Control baseline necessary to protect the system commensurate with risk is selected.

A

RMF Select Task

125
Q

Controls are tailored producing tailored control baselines.

A

RMF Select Task

126
Q

Controls are designed as system-specific, hybrid, or common controls and allocated to the specific system elements.

A

RMF Select Task

127
Q

Controls and associated tailoring actions are documented in security and privacy plans or equivalent documents.

A

RMF Select Task

128
Q

A continuous monitoring strategy for the system that reflects the organizational risk management strategy is developed.

A

RMF Select Task

129
Q

Security and privacy plans reflecting the selection of controls necessary to protect the system and the environment of operation commensurate with risk are reviewed and approved by the authorizing official.

A

RMF Select Task

130
Q

Controls specified in the security and privacy plans are implemented.

A

RMF Implement Task

131
Q

Changes to the planned implementation of controls are documented and the security and control plans are updated based on the changes.

A

RMF Implement Task

132
Q

An assessor or assessment team (with the appropriate level of independence) is selected to conduct the control assessment.

A

RMF Assess Task

133
Q

Documentation needed to conduct the assessments is provided to the assessor or assessment team.

A

RMF Assess Task

134
Q

Control assessment is conducted in accordance with the security and privacy plans.

A

RMF Assess Task

135
Q

Secuity and privacy assessment reports that provide findgins and recommendations are completed.

A

RMF Assess Task

136
Q

Remediation actions to address deficiencies in the controls implemented in the system and environment of operation are taken and security and privacy plans are updated to reflect the remediation actions.

A

RMF Assess Task

137
Q

A plan of action and milestones detailing remediation plans for unacceptable risks identified in security and privacy assessment repots is developed.

A

RMF Assess Task

138
Q

An authorizing package is developed for submission to the authorizing official.

A

RMF Authorize Task

139
Q

A risk determination by the authorizing official that reflects the risk management strategy including risk tolerance is rendered.

A

RMF Authorize Task

140
Q

Risk responses for determined risks are provided.

A

RMF Authorize Task

141
Q

The authorization for the system for the common controls is approved or denied.

A

RMF Authorize Task

142
Q

Authorization decisions, significant vulnerabilities, and risks are reported to organizational officials.

A

RMF Authorize Task

143
Q

The information system and environment of operation are monitored in accordance with the continuous monitoring strategy.

A

RMF Monitor Task

144
Q

Ongoing assessments of control effectiveness are conducted in accordance with the continuous monitoring strategy.

A

RMF Monitor Task

145
Q

The output of continuous monitoring activities is analyzed and responded to appropriately.

A

RMF Monitor Task

146
Q

Risk management documents are updated based on continuous monitoring activities.

A

RMF Monitor Task

147
Q

A process is in place to report the security and privacy posture to the authorizing official and other senior leaders and executives.

A

RMF Monitor Task

148
Q

A system disposal strategy is developed and implemented as needed.

A

RMF Monitor Task

149
Q

Frames the environment, or scope, of where the risk is being assessed.

A

Risk Context

150
Q

Identifies: (i) threats to organizations or threats directed through organizations against other organizations or the Nation, (ii) vulnerabilities internal and external to organizations, (iii) the harm that may occur given the potential for threats exploiting vulnerabilities, and (iv) the likelihood of that will occur.

A

Risk Assessment Purpose

151
Q

Includes: (i) frame, (ii) assess, (iii) respond, and (iv) monitor.

A

Risk Assessment Steps

152
Q

Example of a risk assessment method that combines qualitative and quantitative assessment methods.

A

Heat Map

153
Q

Results are time boxed and not accurate for longer periods of time.

A

Risk Assessment

154
Q

The process of identifying, estimating, and prioritizing information security risks.

A

Risk Assessment

155
Q

Typically includes: (i) a risk assessment process, (ii) and explicit risk model, (iii) an assessment approach, and (iv) and analysis approach.

A

Risk Assessment Methodology

156
Q

Defines key terms and assessable risk factors and the relationships among factors.

A

Risk Model

157
Q

Specifies the range of values risk factors can assume during the risk assessment and how combinations of risk factors are identified/analyzed so that values of those factors can be functionally combined to evaluate risk.

A

Assessment Approach

158
Q

Describes how combinations of risk factors are identified/analyzed to ensure adequate coverage of the problem space at a consistent level of detail.

A

Analysis Approach

159
Q

Defines the risk factors to be assessed and the relationships among those factors.

A

Risk Model

160
Q

Documentation includes: (i) identification of risk factors, and (ii) identification of the relationships among risk factors.

A

Risk Model

161
Q

Include the following: (i) threats, (ii) vulnerabilities, (iii) impact, (iv) likelihood, and (v) predisposing condition.

A

Risk Factors

162
Q

Hostile cyber or physical attack.

A

Threat Source

163
Q

Human error of omission or commission.

A

Threat Source

164
Q

Structural failure of organization-controlled resources.

A

Threat Source

165
Q

Natural and man-made disasters, accidents, and failures beyond the control of an organization.

A

Threat Source

166
Q

Can be either: (i) a single event, action, or circumstance; or (ii) sets and/or sequences of actions, activities, and/or circumstances.

A

Threat Event

167
Q

A set of discrete threat events, attributed to a specific threat source or multiple threat sources, ordered in time, that results in adverse effects.

A

Threat Scenario

168
Q

The response of adversaries to perceived safeguards and/or countermeasures (i.e., security controls), in which adversaries change some characteristic of their intent/targeting in order to avoid and/or overcome those safeguards/countermeasures.

A

Threat Shifting

169
Q

Can occur in one or more domains including: (i) the time domain, (ii) the target domain, (iii) the resource domain, or (iv) the attack planning/attack method domain.

A

Threat Shifting

170
Q

A condition that exists within an organization, a mission or business process, enterprise architecture, information system, or environment of operation which affects the likelihood that threat events, once initiated, result in adverse impacts to organizational operations and assets, individuals, other organizations, or the Nation.

A

Predisposing Condition

171
Q

An assessment of the relative importance of mitigating/remediating the vulnerability.

A

Vulnerability Severity

172
Q

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.

A

Level of Impact