Fiszki: Security+ 601 Part 5 | Quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/107

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

108 Terms

1
New cards

Managerial Control

Controls that are based on overall risk management, the use of cybersecurity audits.

2
New cards

Operational Control

Ensuring that policy and procedures used are limited by security risk, instructions to a guard.

3
New cards

Technical Control

control uses some form of technology to address physical security issues, like automated and machine involved

4
New cards

Preventive Control

a control that prevents specific actions from occurring, like a mantrap prevents a human from entering a facility

5
New cards

Detective Control

A control that is designed to identify any threat that has reached the system, like an IDS

6
New cards

Corrective Control

A control used after an event to minimize the extent of damage, like load balancers and redundant systems act on to ease system overuse.

7
New cards

Deterrent Control

A control that attempts to discourage security violations before they occur, salt on password hashes

8
New cards

Compensating Control

Control that provides an alternative to normal controls that for some reason cannot be used, fire suppression systems are an example of this.

9
New cards

Physical Control

one that prevents specific physical actions from occurring, such a mantraps prevent tailgating, the use of covers over critical buttons is a form of physical control

10
New cards

General Data Protection Regulation (GDPR)

Mandates a baseline set of standards for companies that handle EU citizens' data to better safeguard the processing and movement of citizens' personal data

11
New cards

PCI DSS (Payment Card Industry Data Security Standard)

Protects customer credit card information and is designed to reduce fraud.

12
New cards

Center for Internet Security

Is a set of top 20 security controls that should be implemented as a baseline for cybersecurity risk management

13
New cards

NIST (National Institute of Standards and Technology) Risk Management Framework (RMF)

Mandatory for agencies dealing with federal data, six step process:
1. categorize
2. select
3. implement
4. assess
5. authorize
6. monitor

14
New cards

Cybersecurity Framework CSF

a commercial framework that is defined by: identify, protect, detect, respond, and recover

15
New cards

International Organization for Standardization (ISO)

SSAE SOC 2 report focuses on internal controls related to compliance and ops, SOC type 1 reports evaluate whether proper controls are in place at a specific time and SOC type 2 is done over a period of time to evaluate the effectiveness of controls

16
New cards

Cloud Security Alliance (CSA)

A nonprofit organization with a mission to promote best practices for using cloud computing securely.

17
New cards

Cloud Control matrix

A list of security controls for the cloud

18
New cards

reference architecture

a broad framework that describes all aspects of cloud security

19
New cards

Benchmarks/secure configuration guides

Guidelines to help setup and operate computer systems to a secure level that is understood and documented.

20
New cards

Platform/Vendor specific guides

Hardening guides that are specific to the software or platform.

21
New cards

Web server guides

The connection between the user and the public are always prone to attacks, setting up a external facing application for security is key for unnecessary risks

22
New cards

OS guides

This is the interface that we use to perform tasks and the hardware of the computer, configuration guides are available for each type of platform

23
New cards

Application server

A part of the enterprise that handles specific tasks that we associate with IT systems, ensure that this gets proper configuration with building the servers.

24
New cards

Network Infrastructure Devices

Routers, switches, firewalls, concentrators are all devices that need to be properly configured so that day-to-day processes are tampered with.

25
New cards

Acceptable Use Policy

A policy that goes hand and hand with the internet usage policy which states what is considered acceptable behavior for computer system users.

26
New cards

job rotation

This provides a better experience for workers to gain knowledge of all departments of a company, it also helps ensure no fraudulent activity occurs which improves security awareness

27
New cards

Mandatory Vacations

When an organization requires that an employee take a certain amount of days of vacation consecutively, so that no one person controls a part of a company, having at least two people do the same job ensures higher security overall.

28
New cards

Separation of Duties

Dividing responsibilities between two or more people to limit fraud and promote accuracy of records, it also ensures that not one person has all the keys to the company.

29
New cards

Least Privilege

states that a user should only have a level of access permissions required to perform their job

30
New cards

clean desk space

sensitive information must not be left unsecured in the work area when the worker is not present at act as a custodian

31
New cards

background check

the process of looking up and compiling criminal records, commercial records and financial records of an individual or an organization before they're hired.

32
New cards

Non-Disclosure Agreement (NDA)

a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties.

33
New cards

social media analysis

Analytic method used by companies to ensure workers aren't browsing the web publicly, whether that be through AUPs,P2P or even BitTorrent

34
New cards

onboarding

programs that help employees to integrate and transition to new jobs by making them familiar with corporate policies, procedures, culture, and politics by clarifying work-role expectations and responsibilities.

35
New cards

Offboarding

Facilitates employee departure from the company by assisting the completion of exit tasks, including exit interviews, forms completion, the return of company property, and ensuring that employees receive the appropriate extended benefits.

36
New cards

user training

To ensure that users are aware of and are following appropriate policies and procedures as part of their workplace activities, this can include: gamification, role-based training, phishing simulations, computer-based training, phishing campaigns, and capture the flag

37
New cards

diversity of training techniques

To ensure to match the material to the method of learning to learners, and then test outcomes to ensure successful training has been achieved

38
New cards

Service Level Agreement (SLA)

Part of a service contract where the service expectations are formally defined between parties

39
New cards

Memorandum of Understanding (MOU)

legal documents describing bilateral agreements that express intended actions with respect to some common pursuit or goal

40
New cards

measurement systems analysis

The analysis of the measurement system to determine the accuracy and precision of the data obtained from the measurement.

41
New cards

Business partner agreement

legal agreement between partners that establish the terms, conditions, and expectations of the relationship between partners.

42
New cards

end of life

Term used to describe a products reached the end of it's useful life

43
New cards

end of service

Term used to describe a products end of support from the manufacturer with no updates or services to the product

44
New cards

data governance

The process of managing availability, usability, integrity, and security of data in enterprise systems

45
New cards

data retention

The management of the data lifecycle with an emphasis on when data reaches its end of useful life for an organization.

46
New cards

change management policies

Ensures proper procedures are followed when modifications to the IT infrastructure are made, this about the main process of applying change

47
New cards

change control policies

The process of how changes to anything are sourced, analyzed, and managed, more so the details of how change management occurs.

48
New cards

asset management policies

The policies and processes used to manage the elements of the system, including hardware, software, and the data that is contained within them.

49
New cards

Third-party Risk Management

Vendors, supply chains, business partners, all describe what needs to be accounted for when defining risk with...

50
New cards

Credential Policies

Policies that refer to the processes, services, and software used to store, manage, and log the use of user credentials

51
New cards

Credential Policy Types:

Personnel, Third party, devices, service accounts, admin/root accounts

52
New cards

Risk Types

External, Internal, Multiparty, IP theft, legacy systems, and software compliance/licensing

53
New cards

Acceptance

A business willing to take on a known risk to the company

54
New cards

Avoidance

A business completely stopping a business operation so that they won't endure any risk.

55
New cards

Transference

To buy cybersecurity insurance allows for another company to deal with the risk your business has acquired, this process is called...

56
New cards

Mitigation

A business lessens the impact from a risk by either updating the systems or looking for better systems to use.

57
New cards

Software compliance/licensing risk

Many copies of many software products can be made and used without licenses. and this creates this....

58
New cards

risk analysis

performed via a series of specific exercises that reveal the presence and level of risk across an enterprise

59
New cards

Risk Register

A list of risks associated with a specific system, it contains addt. information associated with each risk too.

60
New cards

Risk Matrix

A matrix that lists an organization's qualitative vulnerabilities, with ratings that assess each one in terms of likelihood and impact on business operations, reputation, and other areas.

61
New cards

Risk Control Assessment

Tool used by the Financial Industry Regulatory Authority (FINRA) to assess a series of risks associated with their member institutions.

62
New cards

Risk Control Self-Assessment

The technique that employs management and staff of all levels to identify and evaluate risks and associated controls

63
New cards

Risk awareness

The knowledge of risk and consequences from them, essential for wide ranges of personnel to know risk associated directly with their role.

64
New cards

Inherent Risk

The amount of risk that exists in the absence of controls

65
New cards

Residual Risk

the risk that remains after known controls are accounted for

66
New cards

Control Risk

risk associated with the chance of a material mis-statement in a company's financial statements

67
New cards

Risk Appetite

Term used to describe a firm's tolerance for risk

68
New cards

Regulations that affect risk posture

Sarbanes Oxley - financial regulations on protecting data
PCI-DSS - credit card data

69
New cards

Qualitative Risk Assessment

determines the risk of an environmental hazard based on human perception rather than data, an example is the matrix/heat map

70
New cards

Quantitative Risk Assessment

analysis of the numerical probabilities of a situation that deals with metric models, ALE, SLE, etc

71
New cards

Likelihood of occurrence

The chance that a particular risk will occur, the measure can be qualitative or quantitative, for qualitative its defined on an annual basis to other annualized measures, for quantitative it's used to create a ranked order

72
New cards

Impact

life - the most important consideration
property - risk to buildings and assets
safety - some environments are to dangerous to work
finance - resulting financial cost
reputation - an event can cause the status or character problems with your company

73
New cards

Asset Value (AV)

The amount of money it would take to replace an asset

74
New cards

Single Loss Expectancy (SLE)

The expected monetary loss every time a risk occurs,

AV * EF =

75
New cards

Annualized Loss Expectancy (ALE)

How much of a single asset is stolen per year?

SLE * ARO =

76
New cards

Annualized Rate of Occurrence (ARO)

The probability that a risk will occur in a particular year.

77
New cards

Disaster

A major event that causes disruptions

78
New cards

Disaster types

Person, Environment, Internal/External

79
New cards

Business Impact Analysis (BIA)

The process used to determine the sources and relative impact values of risk elements in a process.

80
New cards

Recovery Time Objective (RTO)

Used to describe the target time that is set for the resumption of operations after an incident, how long will it take to get back and running to a particular service level? Relative to business Continuity

81
New cards

Recovery Point Objective (RPO)

The time period representing the maximum period of acceptable data loss, when systems startup how far back does the data go? Relative to Backup frequency

82
New cards

Mean Time to Repair (MTTR)

A common measure of how long it takes to repair a given failure.

= (total downtime) / (number of breakdowns)

83
New cards

Mean Time Between Failures (MTBF)

a common measure of reliability of a system and is an expression of the average time between system failures

= (start of downtime- start of uptime) / number of failures

84
New cards

Functional Recovery Plans

Recover from an outage, contact information, technical process, recover and test

85
New cards

Single point of Failure

A component or entity that, should it fail, would adversely affect the entire system, ensure proper backups or substitute options are available

86
New cards

disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.

87
New cards

Mission Essential Functions

Operations that are core to the success of the business, What are the critical systems that define company goals?

88
New cards

Site Risk Assessment

A risk assessment tailored for a specific location of the company

89
New cards

Company Consequences of Privacy and data breaches

Reputation, Identity theft, IP theft, Fines

90
New cards

Escalation

Ensure to create a process or policy that states how breaches reach IT or related personnel to solve these issues

91
New cards

Public Notification and Disclosure

Originally created from California SB 1386, the public has the right to know any breaches or data related incidents with in companies, this law varies from state to state and nations.

92
New cards

Data Classification

the measurements of data to ensure sensitivity labeling and handling so that personnel know whether data is sensitive and understand the levels of protection required

93
New cards

Data classification types:

Private, Sensitive, Confidential, Critical, and Proprietary

94
New cards

PHI (Protected Health Information)

Any information concerning a patient's health, medical condition, diagnosis, or treatment; it can include financial information

95
New cards

Data Types:

Classifications, PII, PHI, Financial, government, and customer

96
New cards

Data minimization

The keeping of only essential data to a person or company, no need to keep addt. information for risk of exposure

97
New cards

Data Masking

a program that protects privacy by replacing personal information with fake values, for example *** ** *** 4567, does not render data unusable

98
New cards

Tokenization

Replaces sensitive data with unique symbols. for example: SNN 456-78-8999 is 345-45-6789

99
New cards

Anonymization

The act of permanently and completely removing personal identifiers from data, such as converting personally identifiable information (PII) into aggregated data.

100
New cards

Pseudo-anonmization

replaces personal information with pseudonyms, for example, Professor Messer is John Doe