Play it safe: Manage security risks Flashcards

1
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business Continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External Threat

A

Anything outside the organization that has the potential to harm organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk

A

Anything that can impact the confidentiality, integrity, or availability of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability

A

A weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attack Vectors

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authorization

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Availability

A

The idea that data is accessible to those who are authorized to access it

23
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s identity

24
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

25
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies

26
Q

Detect

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections

27
Q

Encryption

A

The process of converting data from a readable format to an encoded format

28
Q

Identify

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets

29
Q

Integrity

A

The idea that the data is correct, authentic, and reliable

30
Q

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

31
Q

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53

A

A unified framework for protecting the security of information systems within the U.S. federal government

32
Q

Open Web Application Security Project/Open Worldwide Application Security Project (OWASP)

A

A non-profit organization focused on improving software security

33
Q

Protect

A

A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats

34
Q

Recover

A

A NIST core function related to returning affected systems back to normal operation

35
Q

Respond

A

A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

36
Q

Risk

A

Anything that can impact the confidentiality, integrity, or availability of an asset

37
Q

Security audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations

38
Q

Security controls

A

Safeguards designed to reduce specific security risks

39
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

40
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

41
Q

Threat

A

Any circumstance or event that can negatively impact assets

42
Q

Chronicle

A

A cloud-native tool designed to retain, analyze, and search data

43
Q

Incident response

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

44
Q

Log

A

A record of events that occur within an organization’s systems

45
Q

Metrics

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

46
Q

Operating system (OS)

A

The interface between computer hardware and the user

47
Q

Playbook

A

A manual that provides details about any operational action

48
Q

Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

49
Q

Security orchestration, automation, and response (SOAR)

A

A collection of applications, tools, and workflows that use automation to respond to security events

50
Q

SIEM tools

A

A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations

51
Q

Splunk Cloud

A

A cloud-hosted tool used to collect, search, and monitor log data

52
Q

Splunk Enterprise

A

A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time

53
Q

Incident response

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach