Play It Safe Manage Security Risk Flashcards

1
Q

National Institute of Standards and Technology (NIST) Cybersecurity Framework
(CSF):

A

A voluntary framework that consists of standards, guidelines, and best practices
to manage cybersecurity risk

  1. Prepare
  2. Categorize
  3. Select
  4. Implement
  5. Assess
  6. Authorize
    7.Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assess:

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorize:

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business continuity:

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Categorize:

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

External threat:

A

Anything outside the organization that has the potential to harm organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Implement:

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internal threat:

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Monitor:

A

The seventh step of the NIST RMF that means be aware of how systems are operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prepare:

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware:

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk:

A

Anything that can impact the confidentiality, integrity, or availability of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk mitigation:

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security posture:

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Select:

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shared responsibility:

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Vulnerability:

A

A weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attack vectors:

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Detect:

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Encryption:

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Govern:

A

A NIST core function related to ensuring an organization establishes, oversees, and improves its cybersecurity strategy, policies, roles, and risk management processes to align with business goals and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify:

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53:

A

A unified framework for protecting the security of information systems within the U.S. federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Protect:
A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats
26
Recover:
A NIST core function related to returning affected systems back to normal operation
27
Respond:
A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process
28
Security audit:
A review of an organization's security controls, policies, and procedures against a set of expectations
29
Security controls:
Safeguards designed to reduce specific security risks
30
Security frameworks:
Guidelines used for building plans to help mitigate risk and threats to data and privacy
31
Security posture:
An organization’s ability to manage its defense of critical assets and data and react to change
32
Threat
Any circumstance or event that can negatively impact assets
33
Chronicle:
A cloud-native tool designed to retain, analyze, and search data
34
Incident response:
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach
35
Log:
A record of events that occur within an organization’s systems
36
Metrics:
Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application
37
Operating system (OS):
The interface between computer hardware and the user
38
Playbook:
A manual that provides details about any operational action
39
Security information and event management (SIEM):
An application that collects and analyzes log data to monitor critical activities in an organization
40
Security orchestration, automation, and response (SOAR):
A collection of applications, tools, and workflows that use automation to respond to security events
41
SIEM tools:
A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations
42
Splunk Cloud:
A cloud-hosted tool used to collect, search, and monitor log data
43
Splunk Enterprise:
A self-hosted tool used to retain, analyze, and search an organization's log data to provide security information and alerts in real-time
44
Incident response:
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach
45
Playbook:
A manual that provides details about any operational action
46
What are the 8 security domains identified by CISSP?
1. Security & Risk management 2. Asset security 3.Security Architecture & Engineering 4. Communication & Network Security 5. Identity & Access Managment 6. Security Assessment & Testing 7.Security Operations 8. Software Development Security
47
What is the focus of CISSP: Security & Risk Managment
Defining security goals and objectives, risk mitigation, compliance, business continuoity and legal regulations.
48
What is the focus of CISSP: Asset Security?
Securing Digital & Physical Assets. It's also related to the storage, maintenance, retention and destruction of data.
49
What is the focus of CISSP: Security Architecture & Engineering?
On optimizing data security by ensuring effective tools, systems and processes are in place to protect and organizations assets and data.
50
What is the core concept of CISSP Secure Designed Architecture ?
Shared Responsibility
51
What is Shared Responsibility?
All individuals within an organization take an active role in lowering risk and maintaining both physical and virtual.
52
What is the focus of CISSP: Communication & Network Security
Focused on managing and securing physical networks and wireless communication.
53
What is the focus of CISSP: Identity and Access management, also known as IAM?
Access and Authorization to keep data secure, b y making sure users follow established policies to control and manage assets
54
What is the 4 main components to Identity and Access Managment ?
1.Identification 2 Authentication 3.Authorization 4. Accountability
55
What is the focus of CISSP: Security Assessment and Testing ?
Conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risk, threats and vulnerabilities.
56
What is the focus of CISSP: Security Operations?
Conducting investigations and implementing preventative measures.
57
What is the focus of CISSP: Software Development Security?
On using secure coding practices.
58
Low Risk Assets ?
Information that would not harm the organizations reputation or ongoing operations, and would not cause financial damage if compromised
59
Medium Risk Assets?
Information that is not available to the public and may cause some damage to organizations finances, reputation, and ongoing operations.
60
High Risk Assets?
Information protected by regulations or laws, which is compromised would have a severe negative impact on an organization's finances, ongoing operations, or reputation.
61
What are the three layers of web?
1. Surface web 2. Deep web 3. Dark web
62
What is the CIA triad?
A model which helps inform how organizations consider risk when setting up systems and security policies
63
What does CIA stand for?
1. Confidentiality 2. Integrity 3. Availability
64
CIA Triad :Confidentiality means what?
Only authorized users can access specific assets or data.
65
CIA triad: Integrity means what?
Integrity means that data is correct, authentic and reliable.
66
CIA Triad: Availability means what?
Data is accessible to those who are authorized to access it.
67
What does NIST stand for?
National Institute Of Standards & Technology
68
NIST Cybersecurity Framework (CSF)
A voluntary framework that consist of standards, guidelines and best practices to manage cyber security risk.
69
The NIST CSF Framework consist of six core functions what are they?
1. Govern 2. Indentity 3.Protect 4. Detect 5. Respond 6. Recover
70
What is the NIST S.P. 800-53
A unified framework for protecting the security of information systems within the federal goverment.
71
NIST: Identify
The management of cybersecurity risk and its effect on an organization's people and assets.
72
NIST: Protect
The strategy used to protect and organization through the implementation of policies, procedures, training and tools help to mitigate cybersecurity threats.
73
NIST: Detect
Identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detection.
74
NIST: Respond
Making sure the proper procedures are used to contain, neutralize and analyze security incidents and implement improvements to the security process.
75
NIST: Recover
The process of returning affected systems back to normal operation.
76
What does OWASP stand for?
Open Web Application Security Project
77
What are the OWASP security principles
1. Minimize the attack surface area 2. Principle of least privilege 3. Defense in depth 4. Separation of duties 5. Keep Security Simple 6.Fix security issues correctly
78
What are the 2 types of security audits?
external and internal
79
What are the purpose of security audits?
1. Identify organizational risk 2. Assess controls 3. Correct compliance issues
80
Common elements of a security audit?
1. Establishing the scope and goals 2.Conducting a risk assessment 3.Completing a control 4. Assessing compliance 5.Communicating results
81
What are some common log sources?
Firewall log, Network log, Server log
82
Firewall Log
a record of attempted or established connections for incoming traffic from the Internet. It also include outbound request to the internet from the network.
83
Network Log
a record of all computers and devices that enter and leave the network. It also records connections between devices and services on the network.
84
Server Log
A record of events related to services, such as websites, email, or file shares. It includes actions such as login, password and user name requests.
85
What are the different type of SIEM tools?
1. Self Hosted 2.Cloud Hosted 3. Hybrid Hosted
86