Cybersecurity Flashcards
What institute has instilled a framework for best practices in managing cyber security risks?
National Institute of Standards and Technology (NIST)
What are the five functions the National Institute of Standards and Technology (NIST) bases their framework for cybersecurity on?
- Identify
- Protect
- Detect
- Respond
- Restore
To “know how you can be attacked” refers to what function in the NIST cybersecurity framework?
Identify
To “put controls in place to prevent the attack” refers to what function in the NIST cybersecurity framework?
Protect
To “put controls in place to know when you’ve been attacked” refers to what function in the NIST cybersecurity framework?
Detect
To “know how you can stop the attack once it’s been detected” refers to what function in the NIST cybersecurity framework?
Respond
To “plan how you will restore normal operations” refers to what function in the NIST cybersecurity framework?
Restore
In the context of cybersecurity, what keyword is used to “refer to the idea that data is there when it’s needed”?
Availability
In the context of cybersecurity, what keyword is used to “refer to the idea that data is accurate and hasn’t been tampered with”?
Integrity
In the context of cybersecurity, what keyword is used to “refer to the idea that data is only accessible by authorized people”?
Confidentiality
In the context of cybersecurity, what keyword is used to “refer to a set of data that has value to the organization”?
Information asset
In the context of cybersecurity, what keyword is used to “refers to services used or goods purchased to prevent a threat actor from exploiting a vulnerability”?
Control
What form of cyberattack makes things unavailable to authorized users?
Denial of Service (DoS)
What form of cyberattacked tricks users into divulging their credentials to an attacked?
Phishing
What are six key cybersecurity controls?
- Patch updates
- Application whitelisting
- System hardening
- Least privileged access
- MFA authentication
- Backup systems and data
List three ways malicious actors harm organizations
- Unauthorized access
- Data unavailability
- Data tampering
What three terms ensure data is protected & accurate?
- Availability
- Integrity
- Confidentiality
What process estimates the attack probability and impact a service provides, prioritizing issues found?
Cyber risk assessment
Three ways attackers compromise systems?
- Exploit misconfigurations
- Exploit software vulnerabilities
- Use real credentials
In the context of Cyber Security, what are three control types?
- Preventative (e.g., passwords, updates, training)
- Detective (e.g., antivirus, monitoring)
- Corrective (e.g., incident response, data recovery)
In the context of Cyber Security, what are controls? Why are they important?
Technical/procedural defenses to mitigate vulnerabilities and reduce cyber risk.
Steps in a cyber risk assessment?
- Identify assets.
- Identify threats.
- Assess vulnerabilities.
- Analyze impact.
- Determine likelihood.
- Prioritize risks.