Domain 1 Security and Risk Management Flashcards
s2.6 What part of the CIA triad is key logger? what about encyprtion attack? What about patch managemtn?
They are both Condfidentialty and Integrity. .Patch management is about availablity.
s2.8 IAAA meaning. What does the first A mean.
Identification, Authentication (type1 something you know, 2you have, 3you are) , Authorization, and Accountability.
s2.9 4:40 minutes gives exam scenario and tips
GDPR General Data Protection Regualation
European version of data protection
s2.19 Code of Ethics Preamble
The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhre, to the highest ethical standards of behavior.
s2.19 code of ethics canon
Protect society, the common good, necessary public trust and confidence and the infrasturue. Act honorably, honestly, justly, responsibility and legally. Provide diligent and competent services. Advance and protect the profession
s2.22 What is an administrative control? 3 examples
organizational policies and procedures. reuglation, training and awareness
s2.22 Name 6 types of access control examples
- preventative: example least priviledge. 2.detective: IDS, cctv , antivierus 3. corrective, antivrious, patches, 4. recovery: HA environments. 5. Deterrent: fences, security guards. 6 Compensating: when others are too hard.
What is NIST 800-30?
Its for risk managment. 9 step process.
s2.27 What are the 4 risk responses? what is never okay?
Risk Mitigation, Transference, acceptance, or avoidance. Risk rejection is never ok
s2.24 What are the 4 step risk management cycles?
1 risk identifcation 2 IT risk assessment 3 risk response and mitigation 4 risk and control monitoring and reporting
s2.30 What do you need to know about NIST 800-53 rev5? What do you need to know about the section? What does it use? How many steps is the risk management lifecycle?
security and privacy controls for information systems and organizations. You need to know why when where how and what. It uses control families(specific aspect of security ie access contro, ..risk assessment..20 more), control classes(mangemtn, operational, technical) , and baseline controls. 6 steps.
s2.31 What is NIST 800-37 rev 1&2? What is new on this? What is the NIST cyber secruity frameowkr rev 1.1?
Risk Managment Framework RMF. New: 1provide closer link between risk management and c-suite, 2 institutionalize risk reparatory activities, 3how to integrate cyberseucrity framwork with RMF), 6 integrate supply chain risk, etc. there are 7.baseline control to 800-53. . Identify, protect, detect, repsond , recover.
s2.34 BCP. elephant Buisness continucity plan
Process of creating the long gterm strategic business plans policies and procedures for opeation after a disruptive event.
s2.36 elephant. BIA Business Impact analysis. What is RPO and MTD?
Identifiyes critical and non critcal orgainaiton systems, functions and activities. RPO is recovery point objections. acceptable amout of data that cant be recovered. MTD is maxium tolerable downtime MTD >= RTO + WRT. RTO is recovery time objective and Work recovery time.