Fiszki: Security+ 601 Part 5 | Quizlet

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 107

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

108 Terms

1

Managerial Control

Controls that are based on overall risk management, the use of cybersecurity audits.

New cards
2

Operational Control

Ensuring that policy and procedures used are limited by security risk, instructions to a guard.

New cards
3

Technical Control

control uses some form of technology to address physical security issues, like automated and machine involved

New cards
4

Preventive Control

a control that prevents specific actions from occurring, like a mantrap prevents a human from entering a facility

New cards
5

Detective Control

A control that is designed to identify any threat that has reached the system, like an IDS

New cards
6

Corrective Control

A control used after an event to minimize the extent of damage, like load balancers and redundant systems act on to ease system overuse.

New cards
7

Deterrent Control

A control that attempts to discourage security violations before they occur, salt on password hashes

New cards
8

Compensating Control

Control that provides an alternative to normal controls that for some reason cannot be used, fire suppression systems are an example of this.

New cards
9

Physical Control

one that prevents specific physical actions from occurring, such a mantraps prevent tailgating, the use of covers over critical buttons is a form of physical control

New cards
10

General Data Protection Regulation (GDPR)

Mandates a baseline set of standards for companies that handle EU citizens' data to better safeguard the processing and movement of citizens' personal data

New cards
11

PCI DSS (Payment Card Industry Data Security Standard)

Protects customer credit card information and is designed to reduce fraud.

New cards
12

Center for Internet Security

Is a set of top 20 security controls that should be implemented as a baseline for cybersecurity risk management

New cards
13

NIST (National Institute of Standards and Technology) Risk Management Framework (RMF)

Mandatory for agencies dealing with federal data, six step process:
1. categorize
2. select
3. implement
4. assess
5. authorize
6. monitor

New cards
14

Cybersecurity Framework CSF

a commercial framework that is defined by: identify, protect, detect, respond, and recover

New cards
15

International Organization for Standardization (ISO)

SSAE SOC 2 report focuses on internal controls related to compliance and ops, SOC type 1 reports evaluate whether proper controls are in place at a specific time and SOC type 2 is done over a period of time to evaluate the effectiveness of controls

New cards
16

Cloud Security Alliance (CSA)

A nonprofit organization with a mission to promote best practices for using cloud computing securely.

New cards
17

Cloud Control matrix

A list of security controls for the cloud

New cards
18

reference architecture

a broad framework that describes all aspects of cloud security

New cards
19

Benchmarks/secure configuration guides

Guidelines to help setup and operate computer systems to a secure level that is understood and documented.

New cards
20

Platform/Vendor specific guides

Hardening guides that are specific to the software or platform.

New cards
21

Web server guides

The connection between the user and the public are always prone to attacks, setting up a external facing application for security is key for unnecessary risks

New cards
22

OS guides

This is the interface that we use to perform tasks and the hardware of the computer, configuration guides are available for each type of platform

New cards
23

Application server

A part of the enterprise that handles specific tasks that we associate with IT systems, ensure that this gets proper configuration with building the servers.

New cards
24

Network Infrastructure Devices

Routers, switches, firewalls, concentrators are all devices that need to be properly configured so that day-to-day processes are tampered with.

New cards
25

Acceptable Use Policy

A policy that goes hand and hand with the internet usage policy which states what is considered acceptable behavior for computer system users.

New cards
26

job rotation

This provides a better experience for workers to gain knowledge of all departments of a company, it also helps ensure no fraudulent activity occurs which improves security awareness

New cards
27

Mandatory Vacations

When an organization requires that an employee take a certain amount of days of vacation consecutively, so that no one person controls a part of a company, having at least two people do the same job ensures higher security overall.

New cards
28

Separation of Duties

Dividing responsibilities between two or more people to limit fraud and promote accuracy of records, it also ensures that not one person has all the keys to the company.

New cards
29

Least Privilege

states that a user should only have a level of access permissions required to perform their job

New cards
30

clean desk space

sensitive information must not be left unsecured in the work area when the worker is not present at act as a custodian

New cards
31

background check

the process of looking up and compiling criminal records, commercial records and financial records of an individual or an organization before they're hired.

New cards
32

Non-Disclosure Agreement (NDA)

a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties.

New cards
33

social media analysis

Analytic method used by companies to ensure workers aren't browsing the web publicly, whether that be through AUPs,P2P or even BitTorrent

New cards
34

onboarding

programs that help employees to integrate and transition to new jobs by making them familiar with corporate policies, procedures, culture, and politics by clarifying work-role expectations and responsibilities.

New cards
35

Offboarding

Facilitates employee departure from the company by assisting the completion of exit tasks, including exit interviews, forms completion, the return of company property, and ensuring that employees receive the appropriate extended benefits.

New cards
36

user training

To ensure that users are aware of and are following appropriate policies and procedures as part of their workplace activities, this can include: gamification, role-based training, phishing simulations, computer-based training, phishing campaigns, and capture the flag

New cards
37

diversity of training techniques

To ensure to match the material to the method of learning to learners, and then test outcomes to ensure successful training has been achieved

New cards
38

Service Level Agreement (SLA)

Part of a service contract where the service expectations are formally defined between parties

New cards
39

Memorandum of Understanding (MOU)

legal documents describing bilateral agreements that express intended actions with respect to some common pursuit or goal

New cards
40

measurement systems analysis

The analysis of the measurement system to determine the accuracy and precision of the data obtained from the measurement.

New cards
41

Business partner agreement

legal agreement between partners that establish the terms, conditions, and expectations of the relationship between partners.

New cards
42

end of life

Term used to describe a products reached the end of it's useful life

New cards
43

end of service

Term used to describe a products end of support from the manufacturer with no updates or services to the product

New cards
44

data governance

The process of managing availability, usability, integrity, and security of data in enterprise systems

New cards
45

data retention

The management of the data lifecycle with an emphasis on when data reaches its end of useful life for an organization.

New cards
46

change management policies

Ensures proper procedures are followed when modifications to the IT infrastructure are made, this about the main process of applying change

New cards
47

change control policies

The process of how changes to anything are sourced, analyzed, and managed, more so the details of how change management occurs.

New cards
48

asset management policies

The policies and processes used to manage the elements of the system, including hardware, software, and the data that is contained within them.

New cards
49

Third-party Risk Management

Vendors, supply chains, business partners, all describe what needs to be accounted for when defining risk with...

New cards
50

Credential Policies

Policies that refer to the processes, services, and software used to store, manage, and log the use of user credentials

New cards
51

Credential Policy Types:

Personnel, Third party, devices, service accounts, admin/root accounts

New cards
52

Risk Types

External, Internal, Multiparty, IP theft, legacy systems, and software compliance/licensing

New cards
53

Acceptance

A business willing to take on a known risk to the company

New cards
54

Avoidance

A business completely stopping a business operation so that they won't endure any risk.

New cards
55

Transference

To buy cybersecurity insurance allows for another company to deal with the risk your business has acquired, this process is called...

New cards
56

Mitigation

A business lessens the impact from a risk by either updating the systems or looking for better systems to use.

New cards
57

Software compliance/licensing risk

Many copies of many software products can be made and used without licenses. and this creates this....

New cards
58

risk analysis

performed via a series of specific exercises that reveal the presence and level of risk across an enterprise

New cards
59

Risk Register

A list of risks associated with a specific system, it contains addt. information associated with each risk too.

New cards
60

Risk Matrix

A matrix that lists an organization's qualitative vulnerabilities, with ratings that assess each one in terms of likelihood and impact on business operations, reputation, and other areas.

New cards
61

Risk Control Assessment

Tool used by the Financial Industry Regulatory Authority (FINRA) to assess a series of risks associated with their member institutions.

New cards
62

Risk Control Self-Assessment

The technique that employs management and staff of all levels to identify and evaluate risks and associated controls

New cards
63

Risk awareness

The knowledge of risk and consequences from them, essential for wide ranges of personnel to know risk associated directly with their role.

New cards
64

Inherent Risk

The amount of risk that exists in the absence of controls

New cards
65

Residual Risk

the risk that remains after known controls are accounted for

New cards
66

Control Risk

risk associated with the chance of a material mis-statement in a company's financial statements

New cards
67

Risk Appetite

Term used to describe a firm's tolerance for risk

New cards
68

Regulations that affect risk posture

Sarbanes Oxley - financial regulations on protecting data
PCI-DSS - credit card data

New cards
69

Qualitative Risk Assessment

determines the risk of an environmental hazard based on human perception rather than data, an example is the matrix/heat map

New cards
70

Quantitative Risk Assessment

analysis of the numerical probabilities of a situation that deals with metric models, ALE, SLE, etc

New cards
71

Likelihood of occurrence

The chance that a particular risk will occur, the measure can be qualitative or quantitative, for qualitative its defined on an annual basis to other annualized measures, for quantitative it's used to create a ranked order

New cards
72

Impact

life - the most important consideration
property - risk to buildings and assets
safety - some environments are to dangerous to work
finance - resulting financial cost
reputation - an event can cause the status or character problems with your company

New cards
73

Asset Value (AV)

The amount of money it would take to replace an asset

New cards
74

Single Loss Expectancy (SLE)

The expected monetary loss every time a risk occurs,

AV * EF =

New cards
75

Annualized Loss Expectancy (ALE)

How much of a single asset is stolen per year?

SLE * ARO =

New cards
76

Annualized Rate of Occurrence (ARO)

The probability that a risk will occur in a particular year.

New cards
77

Disaster

A major event that causes disruptions

New cards
78

Disaster types

Person, Environment, Internal/External

New cards
79

Business Impact Analysis (BIA)

The process used to determine the sources and relative impact values of risk elements in a process.

New cards
80

Recovery Time Objective (RTO)

Used to describe the target time that is set for the resumption of operations after an incident, how long will it take to get back and running to a particular service level? Relative to business Continuity

New cards
81

Recovery Point Objective (RPO)

The time period representing the maximum period of acceptable data loss, when systems startup how far back does the data go? Relative to Backup frequency

New cards
82

Mean Time to Repair (MTTR)

A common measure of how long it takes to repair a given failure.

= (total downtime) / (number of breakdowns)

New cards
83

Mean Time Between Failures (MTBF)

a common measure of reliability of a system and is an expression of the average time between system failures

= (start of downtime- start of uptime) / number of failures

New cards
84

Functional Recovery Plans

Recover from an outage, contact information, technical process, recover and test

New cards
85

Single point of Failure

A component or entity that, should it fail, would adversely affect the entire system, ensure proper backups or substitute options are available

New cards
86

disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.

New cards
87

Mission Essential Functions

Operations that are core to the success of the business, What are the critical systems that define company goals?

New cards
88

Site Risk Assessment

A risk assessment tailored for a specific location of the company

New cards
89

Company Consequences of Privacy and data breaches

Reputation, Identity theft, IP theft, Fines

New cards
90

Escalation

Ensure to create a process or policy that states how breaches reach IT or related personnel to solve these issues

New cards
91

Public Notification and Disclosure

Originally created from California SB 1386, the public has the right to know any breaches or data related incidents with in companies, this law varies from state to state and nations.

New cards
92

Data Classification

the measurements of data to ensure sensitivity labeling and handling so that personnel know whether data is sensitive and understand the levels of protection required

New cards
93

Data classification types:

Private, Sensitive, Confidential, Critical, and Proprietary

New cards
94

PHI (Protected Health Information)

Any information concerning a patient's health, medical condition, diagnosis, or treatment; it can include financial information

New cards
95

Data Types:

Classifications, PII, PHI, Financial, government, and customer

New cards
96

Data minimization

The keeping of only essential data to a person or company, no need to keep addt. information for risk of exposure

New cards
97

Data Masking

a program that protects privacy by replacing personal information with fake values, for example *** ** *** 4567, does not render data unusable

New cards
98

Tokenization

Replaces sensitive data with unique symbols. for example: SNN 456-78-8999 is 345-45-6789

New cards
99

Anonymization

The act of permanently and completely removing personal identifiers from data, such as converting personally identifiable information (PII) into aggregated data.

New cards
100

Pseudo-anonmization

replaces personal information with pseudonyms, for example, Professor Messer is John Doe

New cards
robot