CPA ISC - S1 Flashcards
What are the 5 components of NIST CSF?
- Identify
- Protect
- Detect
- Respond
- Recover
What is NIST CSF Implementation Tier 1?
- Ad Hoc
- Not integrated into organizational processes
- Cybersecurity is isolated
What is NIST CSF Implementation Tier 2?
- Cybersecurity may be isolated from organizational processes
- Organization is aware of cybersecurity
- Awareness is there but response is inconsistent
What is NIST CSF Implementation Tier 3?
- Documented policies and procedures
- Organizational risk approach
- Collaborates with and contributes to security community at large
What is NIST CSF Implementation Tier 4?
- Iterative improvements
- Cybersecurity is prioritized organizational wide
- Organization external participation is robust
What is a NIST Current Profile?
The current state of organizational risk management.
What is a NIST Target Profile?
The desired future state of organizational risk management.
What are the 5 steps to using organizational profiles?
SGCAI (Some Guy Created A I)
1. Scope of org profile
2. Gather info to prepare org profile
3. Create org profile
4. Perform gap analysis between current and target profiles
5. Implement action plan to rectify gaps
What are the 8 components of NIST Privacy?
- Identify
- Govern
- Control
- Communicate
- Protect
- Detect
- Respond
- Recover
What is NIST SP 800-53?
It is the standard for federal information security systems. This establishes controls for systems and organizations.
What was the Safe Harbor Framework and Privacy Shield in 2016?
The Safe Harbor Framework was a joint framework between the EU and USA to allow data transfer between the two more freely and legally. However, an EU court struck this down as it was not secure enough.
The Privacy Shield of 2016 was the same thing but was also struck down by an EU court.
What are examples of Primary Cardholder Data?
- Account number
- Cardholder name
- Expiration date
- Service code
What are examples of Sensitive Authentication Data for a cardholder?
- Card verification code
- Card PIN
What is Center for Internet Security (CIS) Controls?
CIS Controls are recommended set of actions, processes, and best practices that can be adopted and implemented by organizations to strengthen their cybersecurity defenses.
What are the 3 CIS Controls design principles?
- Context
- Coexistance
- Consistency
CIS Control Design Principle - Context
An enhancement to the scope and practical applicability of safeguards through incorporation of examples and explanations.
CIS Control Design Principle - Coexistance
Alignment with evolving industry standards and frameworks, including NIST’s CSF 2.0 framework.
CIS Control Design Principle - Consistency
Disruption to controls users are minimized, limiting impact on implementation groups.
What are the 3 CIS Controls Implementation Groups?
- IG1
- IG2
- IG3