Module 3 - 01-1 Flashcards

Frameworks and Controls

1
Q

Define Security Frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Security Lifecycle

A

A constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Purpose of Security Frameworks (5)?

A
  • Protecting personally identifiable information (PII)
  • Securing financial information
  • Identifying security weaknesses
  • Managing organizational risks
  • Aligning security with business goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many Core Components does the Security Framework have?

A

Four (4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Core Components of Security Frameworks (4)?

A
  1. Identifying and documentation security goals
  2. Setting guidelines to achieve security goals
  3. Implementing strong security processes
  4. Monitoring and communicating results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Frameworks allow ____

A

analysts to work alongside other members of the security team to document, implement, and use the policies and procedures that have been created.

It’s essential for an entry-level analyst to understand this process because it directly affects the work they do and how they collaborate with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Security Controls

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security frameworks and controls are ___

A

vital to managing security for all types of organizations and ensuring that everyone is doing their part to maintain a low level of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define the CIA Triad

A

A foundational cybersecurity model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CIA stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Confidentiality

A

Only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Integrity

A

Data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Availability

A

Data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Value

A

Determined by the cost associated with the asset in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does NIST stand for?

A

National Institute of Standards and Technology
(NIST)
(U.S. Based Agency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define NIST

A

A U.S.-based agency that develops multiple voluntary compliance frameworks that organizations worldwide can use to help manage risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does CSF stand for?

A

The Cybersecurity Framework
(CSF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does NIST CSF stand for?

A

National Institute of Standards and Technology:
the Cybersecurity Framework
(NIST CSF)
(U.S. Based Agency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define NIST CSF

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
(security teams use it as a baseline to manage short & long-term risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define Compliance

A

The process of adhering to internal standards and external regulations

22
Q

What does RMF stand for?

A

The Risk Management Framework
(RMF)

23
Q

What does NIST RMF stand for?

A

National Institute of Standards and Technology:
the Risk Management Framework
(NIST RMF)

24
Q

What does FERC-NERC stand for?

A

The Federal Energy Regulatory Commission -
North American Electric Reliability Corporation
(FERC-NERC)

25
Q

Define FERC-NERC

A

A regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid.
They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC.

26
Q

What does CIP stand for?

A

Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC

27
Q

What does FedRAMP® stand for?

A

The Federal Risk and Authorization Management Program
(FedRAMP®)

28
Q

Define FedRAMP

A

A U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings

29
Q

What does CIS stand for?

A

Center for Internet Security
(CIS®)

30
Q

Define CIS

A

A nonprofit with multiple areas of emphasis.
It provides a set of controls that can be used to safeguard systems and networks against attacks.

31
Q

What does GDPR stand for?

A

E.U.’s General Data Protection Regulation
(GDPR)

32
Q

Define GDPR

A

A data protection law established to grant European citizens more control over their personal data.

A European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory

33
Q

What does PCI DSS stand for?

A

Payment Card Industry Data Security Standard
(PCI DSS)

34
Q

Define PCI DSS

A

An international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment

35
Q

What does HIPAA stand for?

A

The Health Insurance Portability and Accountability Act

36
Q

Define HIPAA

A

A U.S. federal law established in 1996 to protect patients’ health information. This law prohibits patient information from being shared without their consent.

37
Q

What three rules govern HIPAA?

A
  1. Privacy
  2. Security
  3. Breach notification
38
Q

What does PHI stand for?

A

Protected Health Information (PHI)

Also known as Patients’ Health Information

39
Q

What does PHI relate to?

A

The past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care

40
Q

What does HITRUST® stand for?

A

Health Information Trust Alliance (HITRUST®)

41
Q

Define HITRUST

A

A security framework and assurance program that helps institutions meet HIPAA compliance

42
Q

What does ISO stand for?

A

International Organization for Standardization (ISO)

43
Q

Define ISO

A

To establish international standards related to technology, manufacturing, and management across borders

44
Q

What does (Accounting) SOC stand for?

A

System and Organizations Controls (SOC)
(SOC type 1 ; SOC type 2)

45
Q

What does AICPA stand for?

A

American Institute of Certified Public Accountants® (AICPA)

46
Q

Who developed (Accounting) SOC?

A

The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard.

47
Q

Define (Accounting) SOC

A

The SOC1 and SOC2 are a series of reports that focus on an organization’s user access policies at different organizational levels such as:
* Associate
* Supervisor
* Manager
* Executive
* Vendor
* Others
They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety.

48
Q

Define United States Presidential Executive Order 14028

A

On May 12, 2021, President Joe Biden released an executive order related to improving the nation’s cybersecurity to remediate the increase in threat actor activity. Remediation efforts are directed toward federal agencies and third parties with ties to U.S. critical infrastructure.

49
Q

A security _____ is a set of guidelines used for building plans to help mitigate risk and threats to data and privacy.

A

framework

Security frameworks are guidelines used for building plans to help mitigate risk and threats to data and privacy.

50
Q

An organization requires its employees to complete a new data privacy training program each year to reduce the risk of a data breach. What is this training requirement an example of?

Security control
Data confidentiality
Personally identifiable information (PII) Cybersecurity Framework (CSF)

A

Security Control

Security controls are safeguards designed to reduce specific security risks.

51
Q

What is a foundational model that informs how organizations consider risk when setting up systems and security policies?

General Data Protection Regulation law (GDPR)
Sensitive personally identifiable information (SPII)
Cybersecurity Framework (CSF)
Confidentiality, integrity, and availability (CIA) triad

A

Confidentiality, integrity, and availability (CIA) triad

The CIA triad is a foundational model that helps inform how organizations consider risk when setting up systems and security policies.

52
Q

True or False?
Security teams use the NIST Cybersecurity Framework (CSF) as a baseline to manage short and long-term risk.

A

True

Security teams use the NIST CSF as a baseline to manage short and long-term risk. The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.