3-3 NIST_CSF_Appendix-A

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards
Cybersecurity Framework
A structured document providing guidelines to manage and mitigate cybersecurity risks across critical infrastructure sectors.
2
New cards
Framework Core
The foundational set of Functions, Categories, Subcategories, and Informative References within the Cybersecurity Framework.
3
New cards
Functions
High-level functions that organize cybersecurity activities into five areas: Identify, Protect, Detect, Respond, and Recover.
4
New cards
Categories
Subsets of Functions that provide specific cybersecurity outcomes and guidance.
5
New cards
Subcategories
Specific outcomes listed under each Category that describe particular cybersecurity activities.
6
New cards
Informative References
Resources and guidelines that provide further information on how to achieve the outcomes of Subcategories.
7
New cards
Risk Management
The process of identifying, assessing, and controlling threats to an organization's assets.
8
New cards
Asset Management
The processes to ensure that the organization’s assets are identified and managed according to their value.
9
New cards
Data Security
Practices aimed at protecting data from unauthorized access and corruption throughout its lifecycle.
10
New cards
Supply Chain Risk Management
The process of identifying, assessing, and mitigating risks associated with suppliers and third-party partners.
11
New cards
Incident Response
A set of procedures and actions taken in response to a detected cybersecurity incident.
12
New cards
Resilience Requirements
Specifications of necessary capabilities to ensure delivery of critical services during adverse situations.
13
New cards
Awareness and Training
Programs designed to educate personnel on their cybersecurity responsibilities and enhance their awareness of cybersecurity risks.
14
New cards
Continuous Monitoring
The ongoing observation and assessment of security controls and systems to detect and respond to threats.
15
New cards
Governance
The framework of policies and processes governing how an organization manages its cybersecurity risk and compliance.
16
New cards
Cyber Supply Chain Risk
The risks associated with dependencies on external suppliers and service providers in maintaining cybersecurity.
17
New cards
Incident Alert Thresholds
Predefined thresholds for determining when to trigger an incident response based on detected anomalies.
18
New cards
Mitigation
Actions taken to reduce the severity or likelihood of a cybersecurity incident.
19
New cards
Recovery Plan
Documentation outlining procedures for restoring systems and operations after a cybersecurity incident.
20
New cards
Vulnerability Management Plan
A strategy to identify, classify, remediate, and mitigate vulnerabilities in systems and software.
21
New cards
Least Privilege
A security principle that restricts user access rights to the bare minimum necessary to perform their jobs.
22
New cards
Assessment
The ongoing evaluation of risks, vulnerabilities, and performance of security measures in an organization.