Module 2 Flashcards

1
Q

Security Frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Controls

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Process of verifying who someone or something is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Biometrics

A

Unique physical characteristics that can be used to verify a persons identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

The concept of granting access to specific resources within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

The data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availibility

A

Data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality

A

Only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST Cybersecurity Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST S.P. 800-53

A

A unified framework for protecting the security of information systems within the federal govenment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST CSF Core Functions

A

Identify

Protect

Detect

Respond

Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify

A

The management of cybersecurity risks and its effect on an organizations people and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protect

A

The strategy used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detect

A

Identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Respond

A

Making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Recover

A

The process of returning affected systems back to normal operation

17
Q

OWASP

A

Open

Web

Applications

Security

Project

18
Q

OWASP Security Principles

A

Minimize attack surface area

Principle of least privilege

Defense in depth

Separation of duties

Keep security simple

Fix security issues correctly

19
Q

Security Audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations

20
Q

Purposes of Internal Security Audits

A

Identify organizational risk

Assess controls

Correct compliance issues

21
Q

Common Elements of Internal Audits

A

Establishing the scope and goals

Conducting a risk assessment

Completing a controls assessment

Assessing compliance

Communicating results

22
Q

Audit Questions

A

What is the audit meant to achieve?

Which assets are most at risk?

Are current control sufficient to protect those assets?

What controls and compliance regulations need to be implemented?

23
Q

Control Categories

A

Administrative controls

Technical controls

Physical controls

24
Q

Stakeholder Communication

A

Summarizes scope and goals

Lists existing risks

Notes how quickly those risks need to be addressed

Identifies compliance regulations

Provides recommendations

25
Q

Audit Checklist

A

Identify the scope of the audit

Complete a risk assessment

Conduct the audit

Create a mitigation plan

Communicate results to stakeholders