Manage Security Risk Flashcards
Module one
What does the term “security posture” refer to in an organization?
An organization’s ability to manage its defense of critical assets and data and react to change.
Name three key focus areas of the security and risk management domain.
Mitigate risk, be in compliance, define security goals and objectives
What is the primary goal of business continuity?
To maintain everyday productivity by establishing risk disaster recovery plans.
According to the concept of shared responsibility, how can employees help lower risk?
By taking an active role and recognizing and reporting security concerns.
Which security domain focuses on ensuring user identities are trusted and authenticated?
Identity and access management.
Name three activities that may be part of establishing security controls.
Collect and analyze security data regularly, implement multi-factor authentication, evaluate whether current controls help achieve business goals.
In which domain do security team members use each phase of the software development lifecycle to conduct security reviews?
Software development security.
Describe a high-risk asset.
An asset with SPII, PII, or intellectual property that, if compromised, can have severe negative impacts.
What type of consequence does a business face if critical operations are interrupted and it faces regulatory fines due to an attack?
Financial consequence.
What step in the Risk Management Framework (RMF) involves being accountable for potential risks?
Authorize.
What is a vulnerability in the context of cybersecurity?
A weakness that can be exploited by a threat.
How is risk defined in cybersecurity?
Anything that can impact the confidentiality, integrity, or availability of an asset.
What does the “categorize” step in the NIST RMF involve?
Developing risk management processes and tasks.
Give an example of an external threat.
Threat actors attempting to gain access to private information from outside the organization.
What does the “implement” step in the NIST RMF mean?
Implementing security and privacy plans for an organization.
Who poses an internal threat?
A current or former employee, external vendor, or trusted partner.
What does the “monitor” step in the NIST RMF involve?
Being aware of how systems are operating.
What is ransomware?
A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.
What is risk mitigation?
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.
Define shared responsibility in cybersecurity.
Define shared responsibility in cybersecurity.
What is social engineering?
A manipulation technique that exploits human error to gain private information, access, or valuables.
What does the “prepare” step in the NIST RMF involve?
Activities necessary to manage security and privacy risks before a breach occurs.
Describe the process of authorizing in the RMF.
Being accountable for the security and privacy risks that may exist in an organization.
What is the focus of asset security?
Managing the cybersecurity processes of organizational assets, including storage, maintenance, retention, and destruction of data.
Why is the security assessment and testing domain important?
It focuses on identifying and mitigating risks, threats, and vulnerabilities through security control testing, data analysis, and audits.