NIST (CSF) Flashcards

1
Q

Used to develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.

A

Identify (ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Used by organizations to develop and implement safeguards to ensure delivery of critical services.

A

Protect (PR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used by an organization to develop and implement appropriate activities identify the occurrence of a cybersecurity event.

A

Detect (DE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used by an organization to develop and implement appropriate activities to take action regarding a detected cybersecurity incident.

A

Respond (RS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Develops and implements appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impairs due to a cybersecurity incident.

A

Recover (RC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Five Functions of Core

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The identification of data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes.

A

Asset Management (ID.AM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Focused on the understanding and prioritization of the organization’s mission, objectives, stakeholders, and activities.

A

Business Environment (ID.BE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The policies, procedures, and processes used to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements.

A

Governance (ID.GV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensure that the organization understands the cybersecurity risk to its organizational operations, organizational assets, and individuals.

A

Risk Assessment (ID.RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishing and implementing the processes to identify, assess and manage supply chain risks within modern enterprises and organizations.

A

Supply Chain Risk Management (ID.SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to establish the organization’s priorities, constraints risk tolerances, and assumptions in order to support operational risk decisions.

A

Risk Management Strategy (ID.RM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Focused on the access to physical and logical assets and associated facilities.

A

Identity Management Authentication and Access Control. (PR.AC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses in the organization’s personnel and partners being provided with cybersecurity awareness education to perform cybersecurity duties and responsibilities.

A

Awareness and Training (PR.AT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensure that security policies, processes, and procedures are maintained and used to mange protection of information systems and assets.

A

Information Protection Processes and Procedures (PR.IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to the consistent management of information and records with organization’s risk strategy to protect the confidentiality, integrity, and availability of the data.

A

Data Security (PR.DS)

16
Q

Ensures that maintenance and repairs of industrial control and information system components are performed consistent with policies and procedures.

A

Maintenance (PR.MA)

17
Q

Manages technical security solutions to ensure the security and resilience of systems and assets is consistent with related policies, procedures, and agreements.

A

Protective Technology (PR.PT)

18
Q

Ensure that anomalous activity is detected and the potential impact of events is understood.

A

Anomalies and Events (DE.AE)

19
Q

Ensure that the information system and assets are continually monitored to identify cybersecurity events and verify the effectiveness of protective measures.

A

Security Continuous Monitoring (DE.CM)

20
Q

Maintained and tested to ensure that processes and procedures create awareness of anomalous events.

A

Detection Processes (DE. DP)

21
Q

Executes and maintains response processes and procedures to ensure appropriate responses to detected cybersecurity incidents.

A

Response Planning (RS.RP)

22
Q

Ensure that all response activities are coordinated with internal and external stakeholders.

A

Communication (RS.CO)

23
Q

Ensure proper analysis is conducted to ensure effective response and support recovery activities.

A

Analysis (RS.AN)

24
Q

Ensure that activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident.

A

Mitigation (RS.MI)

25
Q

Ensure that the organization’s response activities are continually getting better by incorporating lessons learned from current and previous detection and response activities.

A

Improvements (RS.IM)

26
Q

Executes and maintains the recovery processes and procedures to ensure restoration of systems or assets affected by cybersecurity incidents.

A

Recovery Planning (RC.RP)

27
Q

Ensure that the organization’s recovery planning and processes are continually getting better by incorporating lessons learned into future activities.

A

Improvements (RC.IM)

28
Q

Ensure that all restoration activities are coordinated with internal and external parties.

A

Communications (RC.CO)

29
Q

Countermeasures that organizations implement to detect, prevent, reduce, or counteract security risks to their systems and networks.

A

Controls

30
Q

____________ Framework is completely voluntary for companies and organizations to use.

A

NIST Cybersecurity Framework

31
Q

How many:
Outcomes?
Activities?
Functions?

A

108 Outcomes
23 Activities
5 Functions