Manage Security Risks Flashcards

1
Q

CISSP stands for?

A

Certified Information Security Certified Professiinal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Posture

A

An orgs ability to
manage defense of its critical assets and data. Ability to react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 8 Security Domains?

A
  1. Security/Risk Management
    2.Asset Security
  2. Security Architecture / Engineering
  3. Communication/ Network Security
  4. Identity/Access Management
  5. Security Assement/Tetsing
  6. Security Operations
  7. Software Development
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Security and Risk Management?

A

Domain 1
Defining security goals and objectives, risk mitigation, compliance, business continuity, and legal regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Asset Security?

A

Domain 2
Securing digital and physical assets.
Related to the storage, maintenance, retention, and destruction of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Security Architecture and Engineering?

A

Domain 3
Optimizing data security by ensuring effective tools, systems, and processes are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Communication and Network Security?

A

Domain 4
Managing and securing physical networks and wireless communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Identity and Access Management (IAM)?

A

Domain 5
Access and authorization to keep data secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Security Assessment and Testing?

A

Domain 6
Conducting security control testing, collecting and analyzing data, and conducting security audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Security Operations?

A

Domain 7
Conducting investigations and implementing preventative measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Software Development Security?

A

Domain 8
Using secure coding practices (recommended guidelines for creating secure applications and services).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is low Risk?

A

Information that would not harm reputation, operations, or cause financial damage if compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a medium risk threat?

A

Non-public information that may cause some damage to finances, reputation, or operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a high risk threat?

A

Information protected by regulations/laws; severe negative impact if compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is NIST Risk Management Framework (RMF)?

A

A framework provided by the National Institute of Standards and Technology (NIST) used by security professionals to manage risks, threats, and vulnerabilities.

17
Q

What are the 7 steps of NIST?

A
  1. Prepare
  2. Categorize
  3. Select
  4. Implement
  5. Assess
  6. Authorize
  7. Monitor
18
Q

What is NIST Step 1?

A

Prepare. Activities before a breach to manage risks (e.g., monitoring, identifying controls).

19
Q

What is NIST Step 2?

A

Categorize: Develop risk management processes by considering impacts on confidentiality, integrity, and availability.

20
Q

What is NIST Step 3?

A

Select: Choose, tailor, and document security controls (e.g., maintaining playbooks).

21
Q

What is NIST Step 4?

A

Implement: Put security and privacy plans into action (e.g., changing password requirements).

22
Q

What is NIST Step 5?

A

Assess: Evaluate if controls are working correctly and meeting needs; identify weaknesses.

23
Q

What is NIST Step 6?

A

Authorize: Take accountability for risks; involves reporting, action plans, and aligning with security goals.

24
Q

What is NIST Step 7?

A

Monitor: Continuously track system operations and ensure they support security goals; suggest changes if needed.

25
Q

What is a Framework?

A

are guidelines organizations use as a starting point to create specific security policies and processes.
“Provides structure”

26
Q

What are Security Controls?

A

Plans for security risk.
1. Encryption
2. Authentication
3. Authorization
“Actions in a structure”

27
Q

Types of Frameworks?

A
  1. Cyber Threat Framework (CTF)
  2. ISO/IEC 27001
28
Q

What are the control types? (PTA)

A
  1. Physical
  2. Technical
  3. Administrative