Glossary Terms from Module 1-2 Flashcards

1
Q

Define Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Business continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define External threat

A

Anything outside the organization that has the potential to harm organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Risk

A

Anything that can impact the confidentiality, integrity, or availability of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Risk mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

15
Q

Define Vulnerability

A

A weakness that can be exploited by a threat