Play It Safe: Manage Security Risks Flashcards

1
Q

Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor

A

Name the steps of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External threat

A

Anything outside the organization that has the potential to harm organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the five core functions of NIST CSF?

A

Identify, protect, detect, respond, and recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OWASP stand for?

A

Open Worldwide Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OWASP’s security principles?

A

Minimize attack surface area, Principle of least privilege, Defense in depth, Separation of duties, Keep security simple, and Fix security issues correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations

16
Q

List the audit checklist

A

Identify the scope of the audit, Complete a risk assessment, Conduct the audit, Create a mitigation plan, and Communicate results to stakeholders.

17
Q

Attack vectors

A

The pathways attackers use to penetrate security defenses.

18
Q

Authentication

A

The process of verifying who someone is.

19
Q

Authorization

A

The concept of granting access to specific resources in a system.

20
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s identity.

21
Q

Detect

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.

22
Q

Encryption

A

The process of converting data from a readable format to an encoded format.

23
Q

Identify

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets.

24
Q

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53

A

A unified framework for protecting the security of information systems within the U.S. federal government.

25
Q

Open Worldwide Application Security Project (OWASP)

A

A non-profit organization focused on improving software security.

26
Q

Protect

A

A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats.

27
Q

Recover

A

A NIST core function related to returning affected systems back to normal operation.

28
Q

Respond

A

A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process.

29
Q

What does SOAR stand for?

A

Security orchestration, automation, and response

30
Q

Security orchestration, automation, and response (SOAR)

A

A collection of applications, tools, and workflows that uses automation to respond to security events.

31
Q

Chronicle

A

A cloud-native tool designed to retain, analyze, and search data.

32
Q

Incident response

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.

33
Q

Metrics

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application.

34
Q

SIEM tools

A

A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations.

35
Q

Splunk Cloud

A

A cloud-hosted tool used to collect, search, and monitor log data.

36
Q

Splunk Enterprise

A

A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.