Course 2- Play It Safe: Manage Security Risks Flashcards

1
Q

What does ‘Assess’ mean in the NIST RMF?

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ‘Authorize’ refer to in the NIST RMF?

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ‘Business continuity’?

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of ‘Categorize’ in the NIST RMF?

A

The second step of the NIST RMF that is used to develop risk management processes and tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an ‘External threat’?

A

Anything outside the organization that has the potential to harm organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘Implement’ mean in the NIST RMF?

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ‘Internal threat’?

A

A current or former employee, external vendor, or trusted partner who poses a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ‘Monitor’ entail in the NIST RMF?

A

The seventh step of the NIST RMF that means be aware of how systems are operating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the ‘Prepare’ step in the NIST RMF?

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ‘Ransomware’?

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ‘Risk’ refer to?

A

Anything that can impact the confidentiality, integrity, or availability of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ‘Risk mitigation’?

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by ‘Security posture’?

A

An organization’s ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ‘Select’ mean in the NIST RMF?

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘Shared responsibility’?

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ‘Social engineering’?

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a ‘Vulnerability’?

A

A weakness that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an Asset?

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Attack vectors?

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Authentication?

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Authorization?

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Availability?

A

The idea that data is accessible to those who are authorized to access it

23
Q

What are Biometrics?

A

The unique physical characteristics that can be used to verify a person’s identity

24
Q

What is Confidentiality?

A

The idea that only authorized users can access specific assets or data

25
What is the CIA triad?
A model that helps inform how organizations consider risk when setting up systems and security policies
26
What does Detect refer to in NIST?
A core function related to identifying potential security incidents and improving monitoring capabilities
27
What is Encryption?
The process of converting data from a readable format to an encoded format
28
What does Identify refer to in NIST?
A core function related to management of cybersecurity risk and its effect on an organization’s people and assets
29
What is Integrity?
The idea that the data is correct, authentic, and reliable
30
What is the NIST Cybersecurity Framework (CSF)?
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
31
What is NIST Special Publication (S.P.) 800-53?
A unified framework for protecting the security of information systems within the U.S. federal government
32
What is OWASP?
A non-profit organization focused on improving software security
33
What does Protect refer to in NIST?
A core function used to protect an organization through the implementation of policies, procedures, training, and tools
34
What does Recover refer to in NIST?
A core function related to returning affected systems back to normal operation
35
What does Respond refer to in NIST?
A core function related to containing, neutralizing, and analyzing security incidents
36
What is Risk?
Anything that can impact the confidentiality, integrity, or availability of an asset
37
What is a Security audit?
A review of an organization's security controls, policies, and procedures against a set of expectations
38
What are Security controls?
Safeguards designed to reduce specific security risks
39
What are Security frameworks?
Guidelines used for building plans to help mitigate risk and threats to data and privacy
40
What is Security posture?
An organization’s ability to manage its defense of critical assets and data and react to change
41
What is a Threat?
Any circumstance or event that can negatively impact assets
42
What is Chronicle?
A cloud-native tool designed to retain, analyze, and search data.
43
What is incident response?
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.
44
What is a log?
A record of events that occur within an organization’s systems.
45
What are metrics?
Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application.
46
What is an operating system (OS)?
The interface between computer hardware and the user.
47
What is a playbook?
A manual that provides details about any operational action.
48
What is security information and event management (SIEM)?
An application that collects and analyzes log data to monitor critical activities in an organization.
49
What is security orchestration, automation, and response (SOAR)?
A collection of applications, tools, and workflows that use automation to respond to security events.
50
What are SIEM tools?
A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations.
51
What is Splunk Cloud?
A cloud-hosted tool used to collect, search, and monitor log data.
52
What is Splunk Enterprise?
A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time.
53
What is incident response?
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.
54
What is a playbook?
A manual that provides details about any operational action.