GCS 2-1: Risks-Domains

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/84

flashcard set

Earn XP

Description and Tags

Course 2 (Manage Security Risks) Module 1 (Security Domains)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

85 Terms

1
New cards

Security posture

An organization’s ability to manage its defense of critical assets and data, and react to change.

2
New cards

Security and Risk Management

1st CISSP Domain

3
New cards

Asset Security

2nd CISSP Domain

4
New cards

Security Architecture and Engineering

3rd CISSP Domain

5
New cards

Communication and Network Security

4th CISSP Domain

6
New cards

Security and Risk Management

Focused on defining security goals and objectives, risk mitigation, compliance, business continuity, and legal regulations.

7
New cards

Risk mitigation

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

8
New cards

Business continuity

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

9
New cards

Asset Security

Focused on securing digital and physical assets. It’s also related to the storage, maintenance, retention, and destruction of data.

10
New cards

Security Architecture and Engineering

Focused on optimizing data security by ensuring effective tools, systems, and processes are in place to protect an organization’s assets and data.

11
New cards

Shared responsibility

All individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.

12
New cards

Communication and Network Security

Focused on managing and securing physical networks and wireless communications.

13
New cards

Identity and Access Management

Focused on access and authorization to keep data secure, by making sure users follow established policies to control and manage assets.

14
New cards

Components of IAM

Identification, Authentication, Authorization, Accountability

15
New cards

Identification

When a user verifies who they are by providing a user name, an access card, or biometric data such as a fingerprint.

16
New cards

Authentication

The verification process to prove a person’s identity, such as entering a password or PIN.

17
New cards

Authorization

Takes place after a user’s identity has been confirmed and relates to their level of access, which depends on the role in the organization.

18
New cards

Accountability

Refers to monitoring and recording user actions, like login attempts, to prove systems and data are used properly.

19
New cards

Security Assessment and Testing

Focused on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.

20
New cards

Security Operations

Focused on conducting investigations and implementing preventative measures.

21
New cards

Software Development Security

Focused on using secure coding practices.

22
New cards

Elements of security and risk management

Security goals and objectives, risk mitigation processes, compliance, business continuity plans, legal regulations, professional and organizational ethics.

23
New cards

Information Security

Aka InfoSec

24
New cards

InfoSec design processes

Incident response, vulnerability management, application security, cloud security, infrastructure security.

25
New cards

Asset security processes

Conducting a security impact analysis, establishing a recovery plan, and managing data exposure.

26
New cards

Security architecture and engineering design principles

Threat modeling, least privilege, defense in depth, fail securely, separation of duties, keep it simple, zero trust, trust but verify.

27
New cards

Principle of least privilege

The concept of granting only the minimal access and authorization required to complete a task. As an example, a cybersecurity analyst might be asked to ensure that customer service representatives can only view the private data of a customer, such as their phone number, while working to resolve the customer’s issue; then remove access when the customer’s issue is resolved.

28
New cards

Penetration testers

Aka pen testers

29
New cards

Security operation processes

Training and awareness, reporting and documentation, intrusion detection and prevention, SIEM tools, log management, incident management, playbooks, post-breach forensics, reflecting on lessons learned.

30
New cards

Social engineering

A manipulation technique that exploits human error to gain private information, access, or valuables.

31
New cards

Social engineering

An example of a threat.

32
New cards

Threat

Any circumstance or event that can negatively impact assets.

33
New cards

Risk

Anything that can impact the confidentiality, integrity, or availability of an asset. It’s the likelihood of a threat occurring.

34
New cards

Lack of backup protocols

An example of a risk to an organization

35
New cards

Low-risk asset

Information that would not harm the organization’s reputation or ongoing operations, and would not cause financial damage if compromised.

36
New cards

Medium-risk asset

Information that’s not available to the public and may cuase some damage to the organization’s finances, reputation, or ongoing operations.

37
New cards

High-risk asset

Information protected by regulations or laws, which if compromised would have a severe impact on an organization’s finances, ongoing operations, or reputation.

38
New cards

Vulnerability

A weakness that can be exploited by a threat.

39
New cards

Risk

Both a vulnerability and threat must be present in order for there to be a _______.

40
New cards

Ransomware

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

41
New cards

Layers of the web

Surface web, deep web, dark web.

42
New cards

Surface web

The layer that most people use. It contains content that can be accessed using a web browser.

43
New cards

Deep web

This layer generally required authorization, i.e. an organization’s intranet, since it can only be employees or others who have been granted access.

44
New cards

Dark web

This layer can only be accessed by using special software. It carries negative connotations because it is the preferred layer for criminals because of the secrecy it provides.

45
New cards

Key impacts of threats, risks, and vulnerabilities

Financial, identity theft, reputation

46
New cards

Financial impact

Includes interrupted production and services, the cost to correct the issue, and fines if assets are compromised because of non-compliance with laws and regulations.

47
New cards

Identity theft impact

Organizations must decide to store private customer, employee, and outside vendor data, and for how long. Storing any type of sensitive data presents a risk to the organization. Sensitive data can include personally identifiable information, or PII, which can be sold or leaked through the dark web. That’s because the dark web provides a sense of secrecy and threat actors may have the ability to sell data there without facing legal consequences.

48
New cards

Reputation impact

A solid customer base supports an organization’s mission, vision, and financial goals. An exploited vulnerability can lead customers to seek new business relationships with competitors or create bad press that causes permanent damage to an organization’s reputation.

49
New cards

National Institute of Standards and Technology

Aka NIST

50
New cards

NIST Risk Management Framework

Aka NIST RMF

51
New cards

Risk Management Framework

Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor.

52
New cards

RMF Step 1: Prepare

Activities that are necessary to manage security and privacy risks before a breach occurs.

53
New cards

RMF Step 2: Categorize

Used to develop risk management processes and tasks.

54
New cards

RMF STep 3: Select

Choose, customize, and capture documentation of the controls that protect an organization.

55
New cards

RMF Step 4: Implement

Implement security and privacy plans for the organization.

56
New cards

RMF Step 5: Assess

Determine if established controls are implemented correctly.

57
New cards

RMF Step 6: Authorize

Being accountable for the security and privacy risks that may exist in an organization.

58
New cards

RMF Step 7: Monitor

Be aware of how systems are operating.

59
New cards

Examples of digital assets

Social Security Numbers, unique national identification numbers, dates of birth, bank account numbers, mailing addresses.

60
New cards

Examples of physical assets

Payment kiosks, servers, desktop computers, office spaces.

61
New cards

Common risk management strategies

Acceptance, Avoidance, Transference, Mitigation

62
New cards

Acceptance

Accepting a risk to avoid disrupting business continuity.

63
New cards

Avoidance

Creating a plan to avoid the risk altogether.

64
New cards

Transference

Transferring risk to a third party to manage.

65
New cards

Mitigation

Lessening the impact of a known risk.

66
New cards

Health Information Trust Alliance

Aka HITRUST

67
New cards

Insider threats

Staff members or venders abuse their authorized access to obtain data that may harm an organization.

68
New cards

Advanced persistent threats

Aka APTs

69
New cards

Advanced persistent threats

A threat actor maintains unauthorized access to a system for an extended period of time.

70
New cards

External risk

Anything outside the organization that has the potential to harm organizational assets, such as theat actors attempting to gain access to private information.

71
New cards

Internal risk

A current or former employee, vendor, or trusted partner who poses a security risk.

72
New cards

Legacy systems

Old systems that might not be accounted for or updated, but can still impact assets, such as workstations or old mainframe systems. For example, an organization might have an old vending machine that takes credit card payments or a workstation that is still connected to the legacy accounting system.

73
New cards

Multiparty risk

Outsourcing work to third-party vendors can give them access to intellectual property, such as trade secrets, software designs, and inventions.

74
New cards

Software compliance/licensing

Software that is not updated or in compliance, or patches that are not installed in a timely manner.

75
New cards

Open Web Application Security Project

Aka OWASP

76
New cards

OWASP

They publish a standard awareness document about the top 10 most critical security risks.

77
New cards

Examples of vulnerabilities

ProxyLogon, ZeroLogon, Log4Shell, PetitPortam, Security logging and monitoring failures, server-side request forgery.

78
New cards

ProxyLogon

A pre-authenticated vulnerability that affects the Microsoft Exchange server. This means that a threat actor can complete a user authentication process to deploy malicious code from a remote location.

79
New cards

ZeroLogon

A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication protocol is a way to verify a person’s identity. Netlogon is a service that ensures a user’s identity before allowing access to a website’s location.

80
New cards

Log4Shell

Allows attackers to run Java code on someone else’s computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.

81
New cards

PetitPotam

Affects Windows NTLM. It is a theft technique that allows a LAN-based attacker to initiate an authentication request.

82
New cards

Local Area Network

Aka LAN

83
New cards

New Technology LAN Manager

Aka NTLM

84
New cards

Security logging and monitoring failures

Insufficient logging and monitoring capabilities that result in attackers exploiting vulnerabilities without the organization knowing it.

85
New cards

Server-side request forgery

Allows attackers to manipulate a server-side application into accessing and updating backend resources. It can also allow threat actors to steal data.