ISC S1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Nist cyber security framework

application of information technology in an organization is the systematic implementation of hardware and software that can be transmitted, modified, accessed and securely and efficiently stored

( identify, govern, protect, detect, respond, recover )

2
New cards

CSF CORE

describes cyber security outcomes that be used by an organization of any size with a focus on reducing cyber risks through 6 functions: Govern, Identify, Protect, Detect, Respond, Recover

3
New cards

Identify ( ID )

focus on understanding the assets and suppliers of an organization and possible opportunities for improvement

4
New cards

Protect ( PR )

focus on organizations ability to secure its assets to prevent or reduce the likelihood and impact of adverse cybersecurity events

5
New cards

Detect ( DE )

focus on the timely discovery of cybersecurity and incidents by analyzing anomalies and red flags

6
New cards

Respond ( RS )

focus on ability to contain the effects of cyber security incidents

7
New cards

Recovery ( RC) 

support the restoration of the companies normal operations to reduce the impact of incidents 

8
New cards

Govern

covers the tone at the top and oversight of 5 components through policy and oversight

9
New cards

CSF tiers

provides a measure of an organizations information security infrastrcuture sophistication in the form of 4 CSF tiers with 2 subtiers

10
New cards

cybersecurity risk governance

refers to the organizational oversight and decision making around cyber security risks with focus on senior management leadership and tone at the top

11
New cards

cybersecurity risk management

covers more of the day to day operational activities that identify assess, respond, and monitor cyber security risks

12
New cards

CRG tier 1 ( lowest ) ( partiel )

used as needed as a reactive measure with no formal basis on organization objectives 

13
New cards

CRM tier 1 ( lowest ) ( partiel )

limited awareness of cyber security risks at organizational level and is implemented on irregular basis without a process to share information across the organization 

14
New cards

CRG tier 2 ( risk informed )

prioritization is based on organizational risks and management must approve efforts but policies are typically isolated and not organization wide 

15
New cards

CRM tier 2 ( risk informed )

Organization is aware of risks in general and specific supply risks but does not act formally or consistently 

16
New cards

CRG tier 3 (repeatable)

uses cybersecurity in planning and has formal documented policies that are frequently updated based on business landscape 

17
New cards

CRM tier 3 (repeatable)

organization wide risks approach to cybersecurity where risks of assets, suppliers, products, services are consistently and accurately monitored and communicated with leadership 

18
New cards

CRG Tier 4 (adaptive) - highest level

risk informed approach that is organizational wide and used to manage and monitor risks

19
New cards

CRM Tier 4 (adaptive) - highest level

process of continuous improvement that incorporates advanced cyber security tech and practices to an organization and actively adapts to change and responds in timely manor

20
New cards

CSF organizational profiile

Mechanism in which NIST recommends companies measure cybersecurity risk and how to minimize such risk and catagorizes them into 2 profils and 5 repeatable steps for continous improvment: scope, gather info, create, analyze gaps between current and target, and implementation

21
New cards

current profile 

specifies the desired outcomes that an organization has prioritized achieving 

22
New cards

target profile

specify desired outcomes and considers anticipated changes 

23
New cards

community profile

baseline outcomes developed among a number of organizations due to shared interests and goals of industry sector or topic

24
New cards

Nist Privacyframework 

Similar risk management approaches but applied subjects differently ( identify, govern, protect  control, communicate

25
New cards

NIST SP 800-53 framework 

Set of securities and privacy controls applicable to all information systems and now the standard for federal information security systems and is more strict then CSF and privacy framework

26
New cards

NIST big 3 standardization frameworks 

27
New cards
28
New cards
29
New cards