WK 3 Protect against threats, risks and vulnerability's Flashcards

1
Q

What is a Security Framework

A

They are guidelines used for building plans to help mitigate risks and threats to data and privacy.

Security frameworks provide a structured approach to implementing a security lifecycle. The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 core components of Security Frameworks

A
  1. Identifying and documenting security goals
  2. Setting guidelines to achieve security goals
  3. Implementing security processes
  4. Monitoring and communicating results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is purpose of having Security frameworks?

A

The purpose of security frameworks include protecting personally identifiable information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example Identifying and documenting security goals

A

For example, an organization may have a goal to align with the E.U.’s General Data Protection Regulation, also known as GDPR. GDPR is a data protection law established to grant European citizens more control over their personal data. A security analyst may be asked to identify and document areas where an organization is out of compliance with GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of setting guidelines to achieve security goals

A

For example, when implementing guidelines to achieve GDPR compliance, your organization may need to develop new policies for how to handle data requests from individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of Implementing security processes

A

In the case of GDPR, a security analyst working for a social media company may help design procedures to ensure the organization complies with verified user data requests. An example of this type of request is when a user attempts to update or delete their profile information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of Monitoring and communicating results

A

As an example, you may monitor your organization’s internal network and report a potential security issue affecting GDPR to your manager or regulatory compliance officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Security Controls?

A

Security controls are safeguards designed to reduce specific security risks.

For example, your company may have a guideline that requires all employees to complete a privacy training to reduce the risk of data breaches. As a security analyst, you may use a software tool to automatically assign and track which employees have completed this training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CIA Triad stand for?

A

CIA stands for confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the CIA triad?

A

The CIA (confidentiality, integrity, and availability) triad is a foundational cybersecurity model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Confidentiality?

A

Only authorized users can access specific assets or data.

For example, strict access controls that define who should and should not have access to data, must be put in place to ensure confidential data remains safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is integrity?

A

the data is correct, authentic, and reliable.

To maintain integrity, security professionals can use a form of data protection like encryption to safeguard data from being tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Availability ?

A

Data is accessible to those who are authorised to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Asset?

A

An asset is an item perceived as having value to an organisation.

Value is determined by the cost associated with the asset in question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the NIST CSF?

U.S.-based National Institute of Standards and Technology:

A

The NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

Security teams use this as a baseline to manage long and short term risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Compliance?

A

Compliance is the process of adhering to internal standards and external regulations.

17
Q

(Control, frameworks and compliance standards)

The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)

A

FERC-NERC is a regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid.

These types of organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC.

18
Q

(Control, frameworks and compliance standards)

The Federal Risk and Authorization Management Program (FedRAMP®)

A

FedRAMP is a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency across the government sector and third-party cloud providers.

19
Q

(Control, frameworks and compliance standards)

Center for Internet Security (CIS®)

A

CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs.

20
Q

(Control, frameworks and compliance standards)

General Data Protection Regulation (GDPR)

A

GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is not being transparent about the data they are holding about an E.U. citizen and why they are holding that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has 72 hours to notify the E.U. citizen about the breach.

21
Q

(Control, frameworks and compliance standards)

Payment Card Industry Data Security Standard (PCI DSS)

A

PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud.

22
Q

(Control, frameworks and compliance standards)

The Health Insurance Portability and Accountability Act (HIPAA)

A

HIPAA is a U.S. federal law established in 1996 to protect patients’ health information. This law prohibits patient information from being shared without their consent. It is governed by three rules:

Privacy

Security

Breach notification

Organizations that store patient data have a legal obligation to inform patients of a breach because if patients’ Protected Health Information (PHI) is exposed, it can lead to identity theft and insurance fraud. PHI relates to the past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care. Along with understanding HIPAA as a law, security professionals also need to be familiar with the Health Information Trust Alliance (HITRUST®), which is a security framework and assurance program that helps institutions meet HIPAA compliance.

23
Q

(Control, frameworks and compliance standards)

International Organization for Standardization (ISO)

A

ISO was created to establish international standards related to technology, manufacturing, and management across borders. It helps organizations improve their processes and procedures for staff retention, planning, waste, and services.

24
Q

(Control, frameworks and compliance standards)

System and Organizations Controls (SOC type 1, SOC type 2)

A

The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard. The SOC1 and SOC2 are a series of reports that focus on an organization’s user access policies at different organizational levels such as:

Associate

Supervisor

Manager

Executive

Vendor

Others

They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.

25
Q

Hacktivist

A

A person who uses hacking to achieve a political goal

26
Q

Privacy protection

A

The act of safeguarding personal information from unauthorized use

27
Q

Protected health information (PHI)

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

28
Q

Security architecture:

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

29
Q

Security ethics

A

Guidelines for making appropriate decisions as a security professional

30
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

31
Q

Security governance

A

Practices that help support, define, and direct security efforts of an organization