Introduction to security frameworks and controls Flashcards

1
Q

Where do you start as a security analyst when you want to implement additional security measures?

A

identifying your organization’s critical assets and risks. Then you’ll implement the necessary frameworks and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are security frameworks?

A

Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy. Security frameworks provide a structured approach to implementing a security lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security lifecycle?

A

The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of security frameworks?

A

The purpose of security frameworks include protecting personally identifiable information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four core components of security frameworks?

A

Identifying and documenting security goals, setting guidelines to achieve security goals, implementing strong security processes, monitoring and communicating results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is GDPR?

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of identifying and documenting security goals

A

For example, an organization may have a goal to align with the E.U.’s General Data Protection Regulation, also known as GDPR. GDPR is a data protection law established to grant European citizens more control over their personal data. A security analyst may be asked to identify and document areas where an organization is out of compliance with GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give an example of setting guidelines to achieve security goals.

A

For example, when implementing guidelines to achieve GDPR compliance, your organization may need to develop new policies for how to handle data requests from individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give an example of implementing strong security processes

A

In the case of GDPR, a security analyst working for a social media company may help design procedures to ensure the organization complies with verified user data requests. An example of this type of request is when a user attempts to update or delete their profile information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example of monitoring and communicating results

A

As an example, you may monitor your organization’s internal network and report a potential security issue affecting GDPR to your manager or regulatory compliance officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do frameworks allow?

A

Frameworks allow analysts to work alongside other members of the security team to document, implement, and use the policies and procedures that have been created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are frameworks essential for an entry-level analyst?

A

It’s essential for an entry-level analyst to understand this process because it directly affects the work they do and how they collaborate with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are security controls?

A

Security controls are safeguards designed to reduce specific security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of security control

A

For example, your company may have a guideline that requires all employees to complete a privacy training to reduce the risk of data breaches. As a security analyst, you may use a software tool to automatically assign and track which employees have completed this training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly