Module 3 Flashcards

1
Q

What are Security Frameworks?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name for guidelines used for building plans to help mitigate risk and threats to data and privacy?

A

Security Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Security Life Cycle?

A

A constantly evolving set of policies and standards that define how an organisation manages risks, follows established guidelines, and meets regulatory compliance or laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name for a constantly evolving set of policies and standards that define how an organisation manages risks, follows established guidelines, and meets regulatory compliance or laws.

A

Security Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the purposes of Security Frameworks?

A
  • Protecting PII
  • Securing financial information
  • Identifying security weaknesses
  • Managing organisational risks
  • Aligning security with business goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Four Core Components of Frameworks?

A
  • Identifying and documenting security goals
  • Setting guidelines to achieve security goals
  • Implementing strong security processes
  • Monitoring and communicating results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Security Controls?

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the CIA Triad?

A

A foundational model that helps inform how organisations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the “CIA” in “CIA Triad” stand for?

A

Confidentiality. Integrity. Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by Confidentiality?

A

Only authorised users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by Integrity?

A

Data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by Availability?

A

Data is accessible to those who are authorised to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an “Asset”?

A

An item perceived as having value to an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the NIST Cybersecurity Framework (CSF)?

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does NIST stand for?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are disgruntled employees some of the most dangerous threat actors?

A

They often have access to sensitive information and know where to find it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the NIST?

A

A U.S-based agency that develops Compliance Frameworks that organisations worldwide can use to help manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are two examples of NIST frameworks?

A
  • NIST CSF (Cybersecurity Framework)
  • NIST RMF (Risk Management Framework)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are he Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)?

A

A regulation that applies to organisations that work with electricity or that are involved with the North American Power Grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does “CIP” stand for?

A

Critical Infrastructure Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does FERC stand for?

A

The Federal Energy Regulatory Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NERC stand for?

A

North American Electric Reliability Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does FedRAMP stand for?

A

The Federal Risk and Authorization Management Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Federal Risk and Authorization Management Program (FedRAMP) ?

A

U.S. government program that standardises security assessment, authorisation, monitoring, and handling of cloud services and product offerings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of the Federal Risk and Authorization Management Program (FedRAMP)?

A

To provide consistency across the government sector and third-party cloud providers

26
Q

What does CIS stand for?

A

Center for Internet Security

27
Q

What is the Center for Internet Security (CIS) ?

A

A nonprofit with multiple areas of emphasis that provides a set of controls that can be used to safeguard systems and networks against attacks

28
Q

What is the purpose of the Center for Internet Security (CIS)?

A
  • To help organisations establish a better plan of defence
  • Provide actionable controls that security professionals may follow if a security incident occurs
29
Q

What does GDPR stand for?

A

General Data Protection Regulation

30
Q

What’s is the General Data Protection Regulation (GDPR)?

A

An E.U. general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and put of E.U. territory

31
Q

Under GDPR, how long does an organisation have to alert an E.U. citizen if their data compromised?

A

72 hours

32
Q

What does PCI DSS stand for?

A

Payment Card Industry Data Security Standard

33
Q

What is the Payment Card Industry Data Security Standard (PCI DSS)?

A

An international security standard meant to ensure that organisations storing, accepting, processing, and transmitting credit card information do so in a secure environment

34
Q

What is the aim of the Payment Card Industry Data Security Standard (PCI DSS)?

A

To reduce credit card fraud

35
Q

What does HIPAA stand for?

A

The Health Insurance Portability and Accountability Act

36
Q

What is the Health Insurance Portability and Accountability Act (HIPAA)?

A

A U.S. federal law established to protect patients’ health information

37
Q

When was HIPAA established?

A

1996

38
Q

What three rules is HIPAA governed by?

A
  1. Privacy
  2. Security
  3. Breach notification
39
Q

What does HITRUST stand for?

A

Health Information Trust Alliance

40
Q

What is the Health Information Trust Alliance (HITRUST)?

A

A security framework and assurance program that helps institutions meet HIPAA compliance

41
Q

What is the name of a security framework and assurance program that helps institutions meet HIPAA compliance?

A

Health Information Trust Alliance (HITRUST)

42
Q

What does ISO stand for?

A

International Organization for Standardization

43
Q

Why was the International Organization for Standardization (ISO) created?

A
  • To establish international standards related to technology, manufacturing, and management across borders
  • To help organisations improve their processes and procedures for staff retention, planning, waste, and services
44
Q

Who developed the System and Organizations Controls (SOC type 1, SOC type 2)?

A

The American Institute of Certified Public Accountants (AICPA) auditing standards board.

45
Q

What are the System and Organizations Controls (SOC type 1, SOC type 2)?

A

A series of reports that focus on an organisation’s user access policies at different organisational levels

46
Q

What are the System and Organizations Controls (SOC type 1, SOC type 2) used for?

A

Used to assess an organisation’s financial compliance and levels of risk.

They also cover:
- Confidentiality
- Privacy
- Integrity
- Security
- Overall data safety

47
Q

When was the United States Presidential Executive Order 14028 released?

A

May 12th, 2021, by President Joe Biden

48
Q

What are Security Ethics?

A

Guidelines for making appropriate decisions as a security professional.

49
Q

What is the name given to guidelines for making appropriate decisions as a security professional?

A

Security Ethics

50
Q

What are ethical principles in security?

A
  • Confidentiality
  • Privacy protections
  • Laws
51
Q

What are Laws?

A

Rules that are recognised by a community and enforced by a governing entity.

52
Q

What is the name given to rules that are recognised by a community and enforced by a governing entity?

A

Laws

53
Q

What is the name given to a person who is not a member of law enforcement who decides to stop a crime on their own.

A

Vigilante

54
Q

What is a Vigilante?

A

A person who is not a member of law enforcement who decides to stop a crime on their own.

55
Q

According to the International Court of Justice (ICJ), a person or group can deploy a counterattack if:

A

The counterattack…

  • Will only affect the party that attacked first
  • Is a direct communication asking the initial attacker to stop
  • Does not escalate the situation
  • Effects can be reversed
56
Q

What does ICJ stand for?

A

International Court of Justice

57
Q

Explain “Confidentiality” in relation to ethics

A

Relating to ethics, confidentiality means that there needs to be a high level of respect for privacy to safeguard private assets and data.

58
Q

What is Privacy Protection?

A

Safeguarding personal information from unauthorised use.

59
Q

What is the name given to safeguarding personal information from unauthorised use?

A

Privacy Protection

60
Q

Explain Privacy Protection in relation to ethics

A

Security professionals hold an ethical obligation to
- secure private information
- identify security vulnerabilities
- manage organisational risks
- align security with business goals

61
Q

Explain Laws in relation to ethics

A

Security professionals have an ethical obligation to protect their organisation, its internal infrastructure, and the people within the organisation.

62
Q

Whay must security professionals do to fulfil their ethical responsibilities in relation to Laws?

A
  • Remain unbiased and conduct work honestly, responsibly, and with the highest respect for the law.
  • Be transparent and just, and rely on evidence.
  • Ensure they are consistently invested in the work they are doing in order to appropriately and ethically address issues that arise.
  • Stay informed and strive to advance their skills so they can contribute to the betterment of the cyber landscape