Podcast
Questions and Answers
What does the term 'vulnerability' refer to in the context of security?
What does the term 'vulnerability' refer to in the context of security?
- An external threat to an organization
- A risk management process
- A strength that protects against threats
- A weakness that can be exploited by a threat (correct)
Which step of the NIST RMF involves choosing, customizing, and capturing documentation of controls to protect an organization?
Which step of the NIST RMF involves choosing, customizing, and capturing documentation of controls to protect an organization?
- Categorize
- Implement
- Assess
- Select (correct)
What is the term for an organization's ability to maintain everyday productivity by establishing risk disaster recovery plans?
What is the term for an organization's ability to maintain everyday productivity by establishing risk disaster recovery plans?
- Risk mitigation
- Business continuity (correct)
- Shared responsibility
- Security posture
What does 'internal threat' refer to in the context of security?
What does 'internal threat' refer to in the context of security?
What is the process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach called?
What is the process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach called?
Flashcards
Vulnerability
Vulnerability
A weakness in a system that can be exploited by a threat actor.
Select (NIST RMF)
Select (NIST RMF)
The NIST Risk Management Framework (RMF) step focused on choosing, customizing, and documenting security controls.
Business continuity
Business continuity
An organization's ability to maintain essential functions during and after a disruption.
Internal threat
Internal threat
Signup and view all the flashcards
Risk mitigation
Risk mitigation
Signup and view all the flashcards
Study Notes
Vulnerability
- A weakness in a system or its components that could be exploited by a threat to cause harm.
Selecting and Implementing Security Controls
- The NIST Risk Management Framework (RMF) outlines five steps for managing security risks.
- Step 3 - Implement Security Controls, involves choosing, customizing, and documenting controls to protect an organization.
Business Continuity
- The ability of an organization to maintain everyday productivity in the face of a disruption (e.g., natural disaster, cyberattack).
- Requires establishing risk disaster recovery plans.
Internal Threat
- A security risk originating within an organization.
- Examples:
- Unintentional mistakes made by employees
- Malicious actions by insiders
Incident Response
- The process of quickly reducing the impact of a security event, such as a breach, by having effective procedures and rules in place.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.