What organization publishes security standards like ISO and NIST?
International Organization for Standardization (ISO) and National Institute of Standards and Technology (NIST).
10
New cards
What are access controls used for?
To manage user access to data and resources.
11
New cards
What is qualitative risk assessment?
A subjective analysis of risk based on experience and expert judgment.
12
New cards
What is the formula for Single Loss Expectancy (SLE)?
SLE = Asset Value (AV) x Exposure Factor (EF).
13
New cards
What is the difference between risk appetite and risk tolerance?
Risk appetite is the level of risk an organization is willing to accept; risk tolerance is the acceptable variation within that appetite.
14
New cards
What is Recovery Time Objective (RTO)?
The maximum time a system can be down before causing serious damage.
15
New cards
What is Recovery Point Objective (RPO)?
The maximum acceptable amount of data loss measured in time.
16
New cards
What is a right-to-audit clause?
A contract provision allowing security audits of third-party vendors.
17
New cards
What is penetration testing used for?
Simulating attacks to find vulnerabilities in a system.
18
New cards
What is the purpose of regulatory compliance?
To ensure an organization follows laws and industry standards.
19
New cards
What is GDPR?
The General Data Protection Regulation, an EU law protecting personal data privacy.
20
New cards
What is a non-disclosure agreement (NDA)?
A legal contract to keep confidential information private.
21
New cards
What is the purpose of cybersecurity audits?
To evaluate IT security controls and identify weaknesses.
22
New cards
What is the difference between an internal and external audit?
Internal audits are done by the organization, while external audits are done by third parties.
23
New cards
What is phishing awareness training?
Training employees to recognize and avoid phishing attacks.
24
New cards
What is the purpose of user security awareness training?
To educate employees on cybersecurity risks and best practices.
25
New cards
What is the role of operational security (OPSEC)?
To protect sensitive data from being exposed to adversaries.
26
New cards
What are some key components of security awareness training?
Key components include identifying social engineering tactics, understanding password security, and recognizing the importance of reporting suspicious activities.