Play It Safe: Manage Security Risks Flashcards
Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor
Name the steps of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in order
Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.
Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.
Business continuity
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.
Categorize
The second step of the NIST RMF that is used to develop risk management processes and tasks.
External threat
Anything outside the organization that has the potential to harm organizational assets.
Implement
The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.
Monitor
The seventh step of the NIST RMF that means be aware of how systems are operating.
Prepare
The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.
Risk mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.
Select
The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.
Shared responsibility
The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
Identify, protect, detect, respond, and recover.
What are the five core functions of NIST CSF?
Open Worldwide Application Security Project
What does OWASP stand for?
Minimize attack surface area, Principle of least privilege, Defense in depth, Separation of duties, Keep security simple, and Fix security issues correctly.
What is OWASP’s security principles?
Security audit
A review of an organization’s security controls, policies, and procedures against a set of expectations.
List the audit checklist
Identify the scope of the audit, Complete a risk assessment, Conduct the audit, Create a mitigation plan, and Communicate results to stakeholders.
Attack vectors
The pathways attackers use to penetrate security defenses.
Authentication
The process of verifying who someone is.
Authorization
The concept of granting access to specific resources in a system.
Biometrics
The unique physical characteristics that can be used to verify a person’s identity.
Detect
A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.
Encryption
The process of converting data from a readable format to an encoded format.
Identify
A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets.
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53
A unified framework for protecting the security of information systems within the U.S. federal government.
Open Worldwide Application Security Project (OWASP)
A non-profit organization focused on improving software security.
Protect
A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats.
Recover
A NIST core function related to returning affected systems back to normal operation.
Respond
A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process.
What does SOAR stand for?
Security orchestration, automation, and response
Security orchestration, automation, and response (SOAR)
A collection of applications, tools, and workflows that uses automation to respond to security events.
Chronicle
A cloud-native tool designed to retain, analyze, and search data.
Incident response
An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.
Metrics
Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application.
SIEM tools
A software platform that collects, analyzes, and correlates security data from various sources across your IT infrastructure that helps identify and respond to security threats in real-time, investigate security incidents, and comply with security regulations.
Splunk Cloud
A cloud-hosted tool used to collect, search, and monitor log data.
Splunk Enterprise
A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.
Risk
Anything that can impact the confidentiality, integrity, or availability of an asset.
Vulnerability
A weakness that can be exploited by a threat.