Module 3 Flashcards

1
Q

What is security framework?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

Provides a structured approach to IMPLEMENT a security lifestyle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security life cycles?

A

a constantly evolving set of policies and standards that define how an organization
* manage risks
* follows established guidelines
* meets regulatory compliance as laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of security framework?

5 points

A
  • protecting PII
  • securing financial information
  • identifying security weaknesses
  • managing organizational risks
  • aligning security with business goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the standards that an organization defines?

3 answers

A
  • manage risks
  • follows established guidelinees
  • meets regulatory compliance as laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 core elements of security frameworks?

4 points

A
  1. Identifying and documenting security goals
  2. Setting guidelines to achieve security goals
  3. Implementing strong security processes
  4. Monitoring and Communicating Results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are security controls?

A

safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CIA triad? What does it stand for?

A

Confidentiality, Integrity, and Availibility Triad. Foundational Model that helps inform how organizations consider risks when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an asset?

A

an item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is compliance?

A

the process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the NIST CSF? What does it stand for?

A

National Institute of Standards and Technology: the Cybersecurity Framework. A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

teams use it as a baseline to manage short and long term risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does each letter in CIA Triad mean?

A
  • Confidentiality is limiting user to only access certain data and specific assets
  • Integrity data is correct, authentic, reliable.
  • Availibility data is accessible to those who are authorized to access it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some specific framework?

A

FERC-NERC
affects those working with electricity or power grid and portect it
FedRAMP
provides consistency across the government sectory and third party cloud provides
CIS
provides set of controls to protect systems and netowrks against attacks, and plan for defense
PCI DSS
ensure that organization storing, accepting, processing and trasmitting CC information do so in a secured environment
HIPAA
protects patient health information from getting leaked out without their consent to prevent fraud or indentity theft
ISO
establishs internet standards for technology, manuf., management, across borders
SOC1 and SOC2
focuses on an organization user access policies at different organizational levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are security ethics?

A

Guidelines for making appropriate decisions as a security professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the ethical principles?

There are 3

A
  • Confidentiality
  • Privacy protection
  • laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is confidentiality?

A

only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is privacy protection?

A

safeguarding personal information from unauthorized use

17
Q

what are laws?

A

rules that are recognized by a community and enforced by a governing entity

18
Q

to do my job I must what?

A
  • remain unbiased
  • work honestly with high respect for the law
  • be transparent
  • rely on evidence
  • be consistently invested in work
  • stay informed
  • strive to advance your skills
  • contribute to the betterment of the cybersecurity landscape
19
Q

Why can the US not deploy a counterattack on a threat actor?

A

It will count as an act of vigilantism

20
Q

what is a hackivist?

A

a person who uses hacking to achieve a political goal

21
Q

Who is authorized to counterattack?

A
  • employees of the federal government
  • military personnel
  • (ICJ) International Court of Justice