Terms Flashcards
What is an organization’s Security Posture?
Security posture is an organization’s ability to manage its defense of critical assets and data and react to change
Goals of the Security and Risk Management Domain
Security goals and objectives
Risk mitigation processes
Compliance
Business continuity plans
Legal regulations
Professional and organizational ethics
What is Asset security?
Asset security involves managing the cybersecurity processes of organizational assets, including the storage, maintenance, retention, and destruction of physical and virtual data.
What is the concept of shared responsibility?
Shared responsibility is part of the Security Architecture and Engineering domain. It means all individuals involved take an active role in lowering risk during the design of a security system
What is the Security architecture and engineering Domain?
This domain focuses on managing data security. Ensuring effective tools, systems, and processes are in place helps protect an organization’s assets and data. Security architects and engineers create these processes.
What is the Communication and network security Domain?
This domain focuses on managing and securing physical networks and wireless communications. This includes on-site, remote, and cloud communications.
What is the Identity and access management Domain?
The identity and access management (IAM) domain focuses on keeping data secure. It does this by ensuring user identities are trusted and authenticated and that access to physical and logical assets is authorized. This helps prevent unauthorized users while allowing authorized users to perform their tasks.
What is the principle of least privilege?
Identity and Access Management Domain uses what is referred to as the principle of least privilege, which is the concept of granting only the minimal access and authorization required to complete a task.
What is the Security assessment and testing Domain?
The security assessment and testing domain focuses on identifying and mitigating risks, threats, and vulnerabilities.
What are Security Assessments?
Security assessments help organizations determine whether their internal systems are secure or at risk.
What is the Security operations Domain?
The security operations domain focuses on the investigation of a potential data breach and the implementation of preventative measures after a security incident has occurred
What is the Software development security Domain?
The software development security domain is focused on using secure programming practices and guidelines to create secure applications. Having secure applications helps deliver secure and reliable services, which helps protect organizations and their users.
What is an asset?
An asset is an item perceived as having value to an organization.
What is a threat?
A threat is any circumstance or event that can negatively impact assets.
What is a risk?
A risk is anything that can impact the confidentiality, integrity, or availability of an asset.
What is a vulnerability?
A vulnerability is a weakness that can be exploited by a threat.
What are the 3 key Impacts of Threats, Risks, and Vulnerabilities?
Financial
Identity theft
Reputation
Elaborate on Step One of the RMF
Prepare refers to activities that are necessary to manage security and privacy risks before a breach occurs.
What are the 3 layers of the Web?
They are the
Surface web - accessed by a normal browser and required nothing else.
Deep Web - requires Authorization to access such as an organization’s intranet.
Dark Web - Requires special software to access.
What are the 7 steps of the Risk Management Framework?
prepare, categorize, select, implement, assess, authorize, and monitor.
Elaborate on Step Two of the RMF
Step two is categorize, which is used to develop risk management processes and tasks.
Elaborate on Step Three of the RMF
Step three is select. Select means to choose, customize, and capture documentation of the controls that protect an organization.
Elaborate on Step Five of the RMF
Step five is - Assess. Assess means to determine if established controls are implemented correctly.
Elaborate on Step Four of the RMF
Step four is to implement security and privacy plans for the organization.
Elaborate on Step Seven of the RMF
Step seven is Monitor. Monitor means to be aware of how systems are operating.
Elaborate on Step Six of the RMF
Step six is Authorize. Authorize means being accountable for the security and privacy risks that may exist in an organization.
What are Security Frameworks?
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy. Frameworks support organizations’ ability to adhere to compliance laws and regulations.
What are Security Controls?
Security controls are safeguards designed to reduce specific security risks. Security controls are the measures organizations use to lower risk and threats to data and privacy.
What is the CIA triad?
The CIA triad is a model that helps inform how organizations consider risk when setting up systems and security policies. It is made up of three elements that cybersecurity analysts and organizations work toward upholding: confidentiality, integrity, and availability. Maintaining an acceptable level of risk and ensuring systems and policies are designed with these elements in mind helps establish a successful security posture
CIA triad - Confidentiality
Confidentiality is the idea that only authorized users can access specific assets or data.
CIA triad - Integrity
Integrity is the idea that the data is verifiably correct, authentic, and reliable.
CIA triad - Availability
Availability is the idea that data is accessible to those who are authorized to use it.