Domain 1 Summary Cards Flashcards

1
Q

Control Objectives for Information and Related Technologies (COBIT)

A

IT governance framework for risk, control, and performance management. It outlines end to end IT governance objectives and processes that encompass many security requirements and concepts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISO/IEC 27001

A

International standard for information security management systems (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST Cybersecurity Framework (CSF)

A

Guidelines for improving cybersecurity posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Technology Infrastructure Library (ITIL)

A

IT service management best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policies

A

High-level statements of security objectives (e.g., “All data must be encrypted”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standards

A

Mandatory security controls that enforce policies (e.g., “AES-256 encryption for sensitive data”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guidelines

A

Recommended best practices (e.g., “Use passphrases instead of passwords”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedures

A

Step-by-step instructions for implementing policies (e.g., “How to configure encryption”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Management Process

A
  1. Risk Identification
  2. Risk Assessment (Analysis)
  3. Risk Treatment (Response Options)
  4. Risk Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Identification

A

Identify threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Qualitative

A

Subjective assessment (e.g., high, medium, low risk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quantitative

A

Uses numerical values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DREAD

A

Evaluates risk impact based on
Damage
Reproducibility
Exploitability
Affected Users
Discoverability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBIT Principles

A

Principle 1: Meeting Stakeholder Needs
Principle 2: Covering the Enterprise End to End
Principle 3: Applying a Single, Integrated Framework
Principle 4: Enabling a Holistic Approach
Principle 5: Separating Governance from Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STRIDE

A

Threat Modeling methodology developed by Microsoft to help identify and classify computer security threats
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PASTA

A

Process for Attack Simulation and Threat Analysis. Risk based threat model that supports dynamic threat analysis.
Integrates business objectives with technical requirements.

17
Q

7 stages of PASTA

A

Define objectives
Define technical scope
Application decomposition
Threat Analysis
Vulnerability analysis
Attack enumeration
Risk and impact analysis

18
Q

General Data Protection Regulation (GDPR)

A

Regulations that require organizations around the world to protect the privacy of EU citizens.

19
Q

GDPR 7 Principles for Processing Personal Data

A

Lawfulness, fairness, and transparency
Purpose limitation
Data Minimization
Accuracy
Storage limitation
Integrity and confidentiality
Accountability

20
Q

NIST Risk Management Framework (RMF)

A

U.S government framework for security risk management

21
Q

ISO 3100

A

Enterprise risk management framework

22
Q

Common Vulnerabilities and Exposures (CVE)

A

Database of known security vulnerabilities

23
Q

Common Vulnerability Scoring System (CVSS)

A

Measures severity of vulnerabilities