Manage Security Risk Flashcards
Module one
What does the term “security posture” refer to in an organization?
An organization’s ability to manage its defense of critical assets and data and react to change.
Name three key focus areas of the security and risk management domain.
Mitigate risk, be in compliance, define security goals and objectives
What is the primary goal of business continuity?
To maintain everyday productivity by establishing risk disaster recovery plans.
According to the concept of shared responsibility, how can employees help lower risk?
By taking an active role and recognizing and reporting security concerns.
Which security domain focuses on ensuring user identities are trusted and authenticated?
Identity and access management.
Name three activities that may be part of establishing security controls.
Collect and analyze security data regularly, implement multi-factor authentication, evaluate whether current controls help achieve business goals.
In which domain do security team members use each phase of the software development lifecycle to conduct security reviews?
Software development security.
Describe a high-risk asset.
An asset with SPII, PII, or intellectual property that, if compromised, can have severe negative impacts.
What type of consequence does a business face if critical operations are interrupted and it faces regulatory fines due to an attack?
Financial consequence.
What step in the Risk Management Framework (RMF) involves being accountable for potential risks?
Authorize.
What is a vulnerability in the context of cybersecurity?
A weakness that can be exploited by a threat.
How is risk defined in cybersecurity?
Anything that can impact the confidentiality, integrity, or availability of an asset.
What does the “categorize” step in the NIST RMF involve?
Developing risk management processes and tasks.
Give an example of an external threat.
Threat actors attempting to gain access to private information from outside the organization.
What does the “implement” step in the NIST RMF mean?
Implementing security and privacy plans for an organization.