Module 2 - 02-1 Flashcards

More about frameworks and controls

1
Q

Define Security frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the biggest threat to security?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Security Controls

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three common types of controls?

A

1) Encryption
2) Authentication
3) Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Encryption

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption involves converting data from plaintext to ____

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Ciphertext

A

The raw, encoded message that’s unreadable to humans and computers

Ciphertext data cannot be read until it’s been decrypted into its original plaintext form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption is used to ensure _____ of sensitive data

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Authentication

A

The process of verifying who someone or something is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of an advanced method of authentication?

A

Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MFA stand for?

A

Multi-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of an MFA?

A

A security code or biometrics, such as a fingerprint, voice, or face scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Biometrics

A

Unique physical characteristics that can be used to verify a person’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of biometrics (3)?

A

A fingerprint, an eye scan, or a palm scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one example of a social engineering attack that can exploit biometrics?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

17
Q

Define Authorization

A

The concept of granting access to specific resources within a system.

Essentially, authorization is used to verify that a person has permission to access a resource.

18
Q

What does CTF stand for?

A

Cyber Threat Framework (CTF)

19
Q

What organization developed the Cyber Threat Framework (CTF)?

A

The U.S. government

20
Q

Why was the Cyber Threat Framework (CTF) developed?

A

To provide “a common language for describing and communicating information about cyber threat activity.”

21
Q

How does the Cyber Threat Framework (CTF) help cybersecurity professionals and organizations (2)?

A

1) Analyze and share information more efficiently
2) Improve their response to the constantly evolving cybersecurity landscape and threat actors’ many tactics and techniques

22
Q

What does ISO/IEC stand for?

A

International Organization for Standardization/International Electrotechnical Commission (ISO/IEC)

23
Q

Define ISO 27000

A

The ISO 27000 family of standards enables organizations of all sectors and sizes to manage the security of assets, such as financial information, intellectual property, employee data, and information entrusted to third parties.
This framework outlines requirements for an information security management system, best practices, and controls that support an organization’s ability to manage risks.

24
Q

How are Controls used alongside frameworks?

A

Controls are used alongside frameworks to reduce the possibility and impact of a security threat, risk, or vulnerability.

25
Q

In what forms can Controls come in (3)?

A
  • Physical
  • Technical
  • Administrative
26
Q

How are these forms of Control typically used?

A

To:

  • Prevent
  • Detect
  • Correct security issues
27
Q

What are examples of physical controls (4)?

A
  • Gates, fences, and locks
  • Security guards
  • Closed-circuit television (CCTV), surveillance cameras, and motion detectors
  • Access cards or badges to enter office spaces
28
Q

What are examples of technical controls (3)?

A
  • Firewalls
  • MFA
  • Antivirus software
29
Q

What are examples of administrative controls (3)?

A
  • Separation of duties
  • Authorization
  • Asset classification
30
Q

Cybersecurity frameworks and controls are used together to establish an organization’s ______.

A

security posture

31
Q

How do security frameworks enable security professionals to help mitigate risk?

  • They are used to establish guidelines for building security plans.
  • They are used to establish laws that reduce a specific security risk.
  • They are used to create unique physical characteristics to verify a person’s identity.
  • They are used to refine elements of a core security model known as the CIA triad.
A

They are used to establish guidelines for building security plans.

Security frameworks are used to establish guidelines for building security plans that enable security professionals to help mitigate risk.

32
Q

True or False?
Competitor organizations are the biggest threat to a company’s security.

A

False

People are the biggest threat to a company’s security. This is why educating employees about security challenges is essential for minimizing the possibility of a breach.

33
Q

Security controls are safeguards designed to reduce _____ security risks.

  • public
  • broadscale
  • specific
  • general
A

specific

34
Q

A security analyst works on a project designed to reduce the risk of vishing. They develop a plan to protect their organization from attackers who could exploit biometrics. Which type of security control does this scenario describe?

  • Ciphertext
  • Classification
  • Authentication
  • Encryption
A

Authentication

This describes authentication, which is the process of implementing controls to verify who someone or something is before granting access to specific resources within a system.