Unit 5 - Module 1 - Assets Flashcards

1
Q

What do you call anything that can impact the confidentiality, integrity, or availability of an asset?

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 main things to think about when security risk planning ?

A

Assets
Threats
Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you call an item perceieved as having value to an organization?

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you call any circumstance or event that can negatively impact assets?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you call a weakness that can exploited by a threat?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process of tracking assets and the risks that affect them?

A

Asset Managment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call a catalog of assets that need to be protected?

A

Asset Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call the practice of labeling assets based on senesitivity and importance to an oranganization?

A

Asset Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 orders of asset classification?

A

1) Public - is the lowest level of classification. These assets have no negative consequences to the organization if they’re released.
2) Internal-Only -describes assets that are available to employees and business partners.
3) Confidential - refers to assets whose disclosure may lead to a significant negative impact on an organization.
4) Restricted - is the highest level. This category is reserved for incredibly sensitive assets, like need-to-know information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call information that is translated, processed, or stored by a computer?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call data being accessed by one or more users?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call data traveling from one point to another?

A

Data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call data not currently being accessed?

A

Data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call the practice of keeping data in all states away from unauthorized users?

A

Information security ( InfoSec )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 4 cloud security challenges?

A

Misconfiguration - Customers of cloud-based services are responsible for configuring their own security environment. Oftentimes, they use out-of-the-box configurations that fail to address their specific security objectives.

Cloud-native breaches - are more likely to occur due to misconfigured services.

Monitoring access might be difficult - depending on the client and level of service.

Meeting regulatory standards - is also a concern, particularly in industries that are required by law to follow specific requirements such as HIPAA, PCI DSS, and GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call a set of rules that reduces risk and protects information?

A

Policy

17
Q

What are refrences that inform how to set policies?

A

Standards

18
Q

What do you call step-by-step intructions to perform a specific security task?

A

Procedures

19
Q

What are the 3 primary elements that security plans include?

A

Standards
Policies
Procedures

20
Q

What do you call the process of adhering to internal standards and external regulations?

A

Compliance

21
Q

What do you call the rules set by a government or other authority to control the way something is done?

A

Regulations

22
Q

What framework is voluntary that consists of standards, guildlines, and best practices to manage cyberseucirty risk?

A

NIST Cybersecurity Framework ( CSF )

23
Q

What are the 3 NIST CSF components?

A

1) Core
2) Tiers
3) Profiles - The CSF profiles are pre-made templates of the NIST CSF that are developed by a team of industry experts.

24
Q

What are the 5 functions of the NIST CSF core?

A

Identify
Protect
Detect
Respond
Recover