WK 3 Protect against threats, risks and vulnerability's Flashcards
What is a Security Framework
They are guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security frameworks provide a structured approach to implementing a security lifecycle. The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.
4 core components of Security Frameworks
- Identifying and documenting security goals
- Setting guidelines to achieve security goals
- Implementing security processes
- Monitoring and communicating results
What is purpose of having Security frameworks?
The purpose of security frameworks include protecting personally identifiable information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.
Example Identifying and documenting security goals
For example, an organization may have a goal to align with the E.U.’s General Data Protection Regulation, also known as GDPR. GDPR is a data protection law established to grant European citizens more control over their personal data. A security analyst may be asked to identify and document areas where an organization is out of compliance with GDPR.
Example of setting guidelines to achieve security goals
For example, when implementing guidelines to achieve GDPR compliance, your organization may need to develop new policies for how to handle data requests from individual users.
Example of Implementing security processes
In the case of GDPR, a security analyst working for a social media company may help design procedures to ensure the organization complies with verified user data requests. An example of this type of request is when a user attempts to update or delete their profile information.
Example of Monitoring and communicating results
As an example, you may monitor your organization’s internal network and report a potential security issue affecting GDPR to your manager or regulatory compliance officer.
What are Security Controls?
Security controls are safeguards designed to reduce specific security risks.
For example, your company may have a guideline that requires all employees to complete a privacy training to reduce the risk of data breaches. As a security analyst, you may use a software tool to automatically assign and track which employees have completed this training.
What does CIA Triad stand for?
CIA stands for confidentiality, integrity, and availability.
What is the CIA triad?
The CIA (confidentiality, integrity, and availability) triad is a foundational cybersecurity model that helps inform how organizations consider risk when setting up systems and security policies
What is Confidentiality?
Only authorized users can access specific assets or data.
For example, strict access controls that define who should and should not have access to data, must be put in place to ensure confidential data remains safe.
What is integrity?
the data is correct, authentic, and reliable.
To maintain integrity, security professionals can use a form of data protection like encryption to safeguard data from being tampered with.
What is Availability ?
Data is accessible to those who are authorised to access it.
What is an Asset?
An asset is an item perceived as having value to an organisation.
Value is determined by the cost associated with the asset in question.
What is the NIST CSF?
U.S.-based National Institute of Standards and Technology:
The NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
Security teams use this as a baseline to manage long and short term risk