Lesson 1 Flashcards
What is SOC
Security Operations Center
The cost of mitigating risk should never _________ the potential loss.
Meet/Exceed
True or False
It’s impossible to mitigate all risk.
True
Residual risk is the left over risk after all mitigation and controls have been applied.
NIST
National Institute of Standards & Technology
NIST Cyber Security Framework
A voluntary set of guidelines, standards and best practices
5 Components of Cybersecurity Framework
- Identify
- Protect
- Detect
- Respond
- Recover
- Govern (newest)
Incident Response Activities
- Report Attack
- Prepare Options
- Respond
- Identify Threat
- Coordinate
- Validate
Cybersecurity Framework Identify Stage
Understands your systems, assets, data and the risk they face.
Cybersecurity Framework Protect Stage
Implement safeguards and controls to prevent attacks
Cybersecurity Framework Detect Stage
Continuously monitor your systems for suspicious activity.
Cybersecurity Framework Respond Stage
Have a plan to address and contain security incidents.
Cybersecurity Framework Recover Stage
Restore your systems and data after a security incident.
Cybersecurity Framework Govern Stage
Establish and monitor the organizations cybersecurity risk management strategy, expectations and policy.
NIST RMF
National Institute of Standards & Technology Risk Management Framework
NIST RMF Stages
- Prepare
- Categorize
- Select
- Implement
- Assess
- Authorize
- Monitor
What is CIA
CIA Triad
Confidentiality
Integrity
Availability
The C in CIA
Confidentiality - Data is only shared with authorized personnel
The I in CIA
Integrity - Ensures that information or data regains unchanged.