ISC 1 Mod 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

National Institute of Standards and Technology

established in 1901

removes barriers to industrial competitiveness and improve access to resources to promote US research capabilities

2
New cards

NIST Cybersecurity Framework

voluntary framework that is designed to help organizations of all sizes and sectors to manage and reduce their cybersecurity risks

3
New cards

CSF core

CSF tiers

CSF organizational profiles

primary components to manage cybersecurity risk

4
New cards

CSF Core

describes cybersecurity outcomes that can be used by an organization of any size to reduce its cybersecurity risks

5
New cards

govern

identify

protect

detect

respond

recover

What are the six functions of CSF core?

6
New cards

CSF core: govern

this function establishes, communicates, and monitors the organization’s cybersecurity risk management strategy, expectations, and policy

assists an organization in achieving and prioritizing outcomes of the other five functions in relation to the organization’s mission and stakeholder expectations

7
New cards

CSF core: identify

this function focuses on understanding the assets and suppliers of an organization and the cybersecurity risk related to these assets and suppliers

includes identifying improvement opportunities related to the organization’s cybersecurity risk management policies, plans, processes, procedures and practices

8
New cards

CSF core: protect

focuses on an organizations ability to secure its assets to prevent or reduce the likelihood and impact of adverse cybersecurity events

9
New cards

CSF core: Detect

focuses on the timely discovery of cybersecurity attacks and incidents by analyzing anomalies, indicators of compromise, and other potentially adverse events that may indicate that a cybersecurity attack or incident is occurring

10
New cards

CSF core: respond

focuses on a companys ability to contain the effects of cybersecurity incidnets

11
New cards

CSF core: recover

focuses on supporting the timely restoration of a company’s normal operations to reduce the impact of cybersecurity incidents and communicate efforts effectively and appropriately

12
New cards

CSF Tiers: Tier 1

there is limited awareness of cybersecurity risks at the organizational level

13
New cards

CSF Tiers: Tier 2

the organization is aware of the cybersecurity risks in general and specific risks associated with its suppliers, but does not act consistently or formally in response to those risks

14
New cards

CSF Tiers: Tier 3

there is an organization-wide risk approach to cybersecurity where risks of assets, suppliers, and products and services are consistently and accurately monitored, as well as regularly communicated among senior leadership

15
New cards

CSF Tiers: Tier 4

through a process of continuous improvement that incorporates advanced cybersecurity technologies and practices, the organization actively adapts to a changing technological landscape and responds in a timely, effective manner to evolving threats

16
New cards

CSF organizational profiles

the mechanisms by which NIST recommends companies measure cybersecurity risk and establish a road map to ensure the organization can minimize such risk

17
New cards

a current profile

specifies the outcome that an organization is achieving based on the current cybersecurity posture

18
New cards

a target profile

specifies the desired outcome that an organization has prioritized achieving, and that considers anticipated changes to the organization’s cybersecurity posture

19
New cards

commuity profiles

are baseline outcomes developed among a number of organization due to the shared interest and goals of a particular industry sector, topic, or use case

20
New cards

NIST Privacy Framework

published in early 2020

to protect individual’s data as used in data processing applications

21
New cards

true

true or false: the NIST privacy framework also includes two extra approaches, control and communicate.

22
New cards

office of management and budget

requires the controls for federal information systems

23
New cards

the federal information security modernization act

requires the implementation of minimum controls to protect federal information and information systems