Domain 1 Flash Cards

1
Q

Acceptable risk

A

A suitable level of risk commensurate with the potential benefits of the organization’s operations as determined by senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit/auditing

A

The tools, processes, and activities used to perform compliance reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensuring timely and reliable access to and use of information by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business continuity (BC)

A

Actions, processes, and tools for ensuring an organization can continue critical operations during a contingency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business continuity and
disaster recovery (BC/DR)

A

A term used to jointly describe business continuity and disaster recovery efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business impact analysis
(BIA)

A

A list of the organization’s assets, annotated to reflect the criticality of each asset to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compliance

A

For the IT professional, includes the activities that maintain and provide systematic proof of both adherence to internal policies and the external laws, guidelines, or regulations imposed upon the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality

A

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data custodian

A

The person/role within the organization who usually manages the data on a day-to-day basis on behalf of the data owner/controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data owner/controller

A

The data controller determines the purposes for which and the manner in which personal data is processed. It can do this either on its own or jointly or in common with other organization. This means that the data controller exercises overall control over the ‘why’ and the ‘how’ of a data processing activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data subject

A

The individual human related to a set of personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disaster recovery (DR)

A

Those tasks and activities required to bring an organization back from contingency operations and reinstate regular operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Due diligence

A

is a management process used to gather facts before making a decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Due Care

A

refers to the effort made by an ordinarily prudent or reasonable party to avoid harm to another, taking the circumstances into account. It refers to the level of judgment, care, prudence, determination, and activity that a person would reasonably be expected to do under particular circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Governance

A

The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles, and procedures the organization uses to make
those decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Governance committee

A

A formal body of personnel who determine how decisions will be made within the organization and the entity that can approve changes and exceptions to current relevant governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Guidelines

A

Suggested practices and expectations of activity to best accomplish tasks and attain goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Integrity

A

Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Intellectual property

A

In general terms, intellectual property is any product of the human intellect that the law protects from unauthorized use by others. The ownership of intellectual property inherently creates a limited monopoly in the protected property. Intellectual property is traditionally comprised of four categories: patent, copyright, trademark, and trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Maximum allowable
downtime (MAD)

A

The measure of how long an organization can survive an interruption of critical functions.
[also known as maximum tolerable downtime (MTD)]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Personally identifiable
information (PII)

A

Any data about a human being that could be used to identify that person.

22
Q

Policy

A

Documents published and promulgated by senior management dictating and describing the organization’s strategic goals.

23
Q

Privacy

A

The right of a human individual to control the distribution of information about him or herself.

24
Q

Procedures

A

Explicit, repeatable activities to accomplish a specific task. Procedures can address one-time or infrequent actions or common, regular occurrences

25
Q

Recovery time objective
(RTO)

A

A measure of how much data the organization can lose before the organization is no longer viable.
RTO must be less than the Maximum Tolerable Downtime
RTO < MTD aka MAD

26
Q

Residual risk

A

The risk remaining after security controls have been put in place as a means of risk mitigation.

27
Q

Risk

A

The possibility of damage or harm and the likelihood that damage or harm will be realized.

28
Q

Risk Frameworks

A

Provide a structured approach to identifying, assessing, prioritizing, and managing risk to guide decision-making.
Provide the overarching structure for making risk-informed decisions. Address the “why” - they guide strategic decision-making about risk.

29
Q

Risk acceptance

A

Determining that the potential benefits of a business function outweigh the possible risk impact/likelihood and performing that business function with no other action. Do nothing, and you must
accept the risk and potential loss if threat occurs.

30
Q

Risk avoidance

A

Determining that the impact and/or likelihood of a specific risk is too great to be offset by the potential benefits and not performing a certain business function because of that determination. When costs of mitigating or accepting are higher than benefits of the service

31
Q

Risk mitigation

A

Putting security controls in place to attenuate the possible impact and/or likelihood of a specific risk. You do this by implementing a
countermeasure and accepting the residual risk.

32
Q

Risk transference

A

Paying an external party to accept the financial impact of a given risk. Also known as Risk Assignment.

33
Q

Security control framework

A

A notional construct outlining the organization’s approach to security, including a list of specific security processes, procedures, and solutions used by the organization.
Provide a prescriptive set of cybersecurity safeguards and best practices to protect an organization’s valuable assets. Help in implementing the risk management strategy. Address the “how” – providing specific controls to mitigate cybersecurity risks.

34
Q

Security governance

A

The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization.

35
Q

Standards

A

Specific mandates explicitly stating expectations of performance or conformance.

36
Q

5 pillars of information security

A

They are confidentiality, integrity, and availability, authenticity, and nonrepudiation

37
Q

Sherwood Applied Business Security Architecture (SABSA)

A

is a security architecture framework and methodology. It focuses on aligning security with business goals by providing a structured method for designing, implementing, and managing security architectures.
It can be used in conjunction with both risk frameworks and security control frameworks.
It adds a layer focused on practical security architecture implementation. Adds another “how” layer by focusing on the structure and design of the security architecture itself.

38
Q

Federal Risk and Authorization Management Program (FEDRAMP)

A

a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

39
Q

ISO/IEC 27001:2022

A

Outlines a framework for implementing, maintaining, and continually improving an Information Security Management System (ISMS)
An ISMS is a set of policies, processes, and controls that helps organizations protect their information assets. Guides in Identifying information assets and assessing their value and information security risks AND
Implementing mitigating security controls (based on ISO 27002)
Regularly monitoring and measuring effectiveness of and continuously improving the ISMS. Focus on the WHAT and WHY

40
Q

ISO/IEC 27002:2022

A

Offers best practices and control objectives related to
key aspects of cybersecurity in support of ISO/IEC 27001
Focus areas include access control, cryptography, human resource
security, operational security, and incident response.
Serves as a practical blueprint for organizations aiming to effectively
safeguard their information assets against cyber threats.
Focus on the HOW

41
Q

Privacy impact assessment(PIA)

A

is designed to identify the privacy data being collected, processed, or stored by a system, and assess the effects of a data breach. To conduct you must define assessment scope,
data collection methods, and plan for data retention.

42
Q

External Dependencies

A

Entities outside the organization that it depends on for
business continuity, disaster recovery, or operations.
EXAMPLES - ISPs, utility companies, providers of
recovery site(s), and fuel for backup generators.

43
Q

Hardware Root of Trust

A

A line of defense against executing
unauthorized firmware on a system
And when certificates are used in FDE, they use a hardware root of trust for key storage.
It verifies that the keys match before the secure boot process takes place. Examples Trusted platform module (TPM) and Silicon root of trust (SRoT)

44
Q

Silicon Root of Trust

A

a specialized chip or module embedded directly into the hardware of a device (server, IoT, etc.)
contains a unique, unchangeable cryptographic identity that is established during manufacturing
acts as an anchor point for verifying the integrity of the system’s firmware

45
Q

Physically Unclonable Function

A

Hardware component that generates a digital fingerprint or signatures based on the unique physical characteristics of an integrated circuit or chip.
When a PUF is queried, or given a challenge, it responds with a unique output, based on the chip’s inherent variations.
This response, like a fingerprint, is impossible to clone or recreate in another device.

46
Q

SOFTWARE BILL OF MATERIALS (SBOM)

A

A list of all software components, libraries, and modules that go into a particular software build or product.
The SBOM functions as the inventory of all the building blocks that make up a software product.
Helps organizations better understand, manage, and secure their applications.

47
Q

ICS2 Code of Ethics

A

1 Protect society, the commonwealth,
and the infrastructure
2 Act honorably, honestly, justly,
responsibly, and legally
3 Provide diligent and competent
service to principals
4 Advance and protect the profession

48
Q

4 levels of Security Policy Development

A
  1. Acceptable use policy
    Assign roles and responsibilities
  2. Security baselines
    define “minimum levels”
  3. Security guidelines
    Offer recommendations
    Security baselines
  4. Security procedures
    Detailed step
    by step
49
Q

Risk Deterrence

A

Implementing deterrents to
would be violators of security and policy

50
Q

Risk Rejection

A

.An unacceptable possible
response to risk is to reject risk or ignore risk.

51
Q
A