Cybersecurity and Audit's Role Flashcards
Which NIST cybersecurity framework function focuses on prevention controls, such as network perimeter security and identity management?
Protect
Which line of defense is responsible for formal risk evaluations?
Second
Cybersecurity is focused on protection of information assess from loss of:
Confidentiality
Integrity
Availability
Which NIST control function includes control objectives relating to security continuous monitoring?
Detect
Cybersecurity controls are related to which of the following network environments?
The internet network
Internal network
Wireless network
Business partner connections
What are the categories of the Identify function?
Asset Management Business Environment Governance Risk Management Risk Management Strategy Supply Chain Risk Management
What are the functions of the NIST Cybersecurity Framework
Identify Protect Detect Respond Recover
What are the categories of the Protect function?
-Identity Management and Access Control
-Awareness and Training
-Information Protection Processes and Procedures
Maintenance
-Protective Technology
What are the categories of the Detect function?
- Anomalies and Events
- Security Continuous Monitoring
- Detection Processes
What are the categories of the Respond function?
- Response Planning
- Communications
- Analysis
- Mitigation
- Improvements
What are the categories of the Recover function?
- Recovery Planning
- Improvements
- Communications
What are the three lines of defense?
- ownership, implementation, execution
- risk management, including monitoring/measurement
- independent testing and assurance
What are the typical review activities for the first line of defense (management)?
- Formal risk acceptance
- control self-assessments
- attack/breach penetration testing
- functional/technical testing
- social/behavioral testing
- regular management review
what are the typical activities for the second line of defense (risk management)?
- threat, vulnerabilities, risk
- formal risk evaluation
- business impact analysis (BIA)
- emerging risk
What are the typical activities for the third line of defense (internal audit)?
- internal control testing
- cybersecurity compliance
- investigation/forensics