Security Frameworks and Controls Overview
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the CIA triad stand for in cybersecurity?

  • Confidentiality, identification, auditing
  • Confidentiality, integrity, availability (correct)
  • Control, identification, assessment
  • Compliance, integration, accessibility
  • Which organization provides essential guidelines for cybersecurity practices?

  • Federal Bureau of Investigation (FBI)
  • International Organization for Standardization (ISO)
  • Internet Engineering Task Force (IETF)
  • National Institute of Standards and Technology (NIST) (correct)
  • Which of the following is a function of the NIST Cybersecurity Framework (CSF)?

  • Reduce compliance costs
  • Enhance software development
  • Identify potential risks (correct)
  • Protect intellectual property
  • What is the purpose of NIST Special Publication (SP 800-53)?

    <p>To offer a unified framework for protecting information systems</p> Signup and view all the answers

    Which is NOT one of the five core functions of the NIST Cybersecurity Framework?

    <p>Interpret</p> Signup and view all the answers

    What is the primary goal of frameworks provided by NIST?

    <p>To develop plans that mitigate cybersecurity risks</p> Signup and view all the answers

    What is the primary focus of the confidentiality principle in the CIA triad?

    <p>Only authorized users can access specific assets or data.</p> Signup and view all the answers

    How does the NIST Cybersecurity Framework (CSF) help organizations?

    <p>By providing structured guidance to manage cybersecurity risks</p> Signup and view all the answers

    Which method is commonly used to verify the integrity of data?

    <p>CRYPTOGRAPHY.</p> Signup and view all the answers

    Which choice best describes what security controls in the NIST framework aim to maintain?

    <p>The CIA triad for government systems</p> Signup and view all the answers

    In the context of availability, what does it mean for data to be 'inaccessible'?

    <p>Authorized users cannot utilize the data when needed.</p> Signup and view all the answers

    What is one way an organization can implement the integrity principle?

    <p>By implementing encryption to transform data.</p> Signup and view all the answers

    Which of these scenarios best demonstrates the principle of confidentiality?

    <p>Data about customer purchases is only shared with authorized personnel.</p> Signup and view all the answers

    Which option below is an example of data availability in a workplace?

    <p>Employees can access the internal network remotely.</p> Signup and view all the answers

    What action can threaten the integrity of data?

    <p>Unauthorized modification of data by external users.</p> Signup and view all the answers

    Why is encryption considered crucial for maintaining integrity?

    <p>It transforms data to prevent unauthorized access and tampering.</p> Signup and view all the answers

    What is the main purpose of the IDENTIFY function in NIST CSF?

    <p>To manage cybersecurity risk and its impact on people and assets.</p> Signup and view all the answers

    Which function in the NIST CSF involves establishing policies and procedures to mitigate threats?

    <p>Protect</p> Signup and view all the answers

    What is the main objective of keeping security simple?

    <p>To facilitate collaborative work and manage security controls effectively.</p> Signup and view all the answers

    In fixing security issues correctly, what is the priority after identifying a vulnerability?

    <p>To conduct tests to ensure that repairs are successful.</p> Signup and view all the answers

    In which function is monitoring and improving detection capabilities emphasized?

    <p>Detect</p> Signup and view all the answers

    What is a key responsibility during the RESPOND function?

    <p>Documenting and analyzing security incidents.</p> Signup and view all the answers

    What does the principle of 'fail securely' imply when a control fails?

    <p>It should revert to the most secure options by closing all connections.</p> Signup and view all the answers

    Why should organizations be cautious about trusting third-party services?

    <p>They may have different and potentially less secure policies.</p> Signup and view all the answers

    The RECOVER function primarily focuses on which of the following?

    <p>Restoring affected systems and data.</p> Signup and view all the answers

    What is a major flaw in the concept of security by obscurity?

    <p>It depends solely on keeping system details confidential.</p> Signup and view all the answers

    Which of the following best describes the relationship between proactive and reactive measures in security operations?

    <p>Both measures are essential for effective security strategies.</p> Signup and view all the answers

    Why is it important to study historical data as part of the PROTECT function?

    <p>To identify new threats and improve policies.</p> Signup and view all the answers

    What principle emphasizes that security should be the default state of an application?

    <p>The optimal security state should be the default for users.</p> Signup and view all the answers

    What does the ability to quickly recover from security incidents help an organization to minimize?

    <p>Level of risk caused by incidents.</p> Signup and view all the answers

    What might indicate an organization is not applying security principles effectively?

    <p>Employees have an easy time accessing sensitive data.</p> Signup and view all the answers

    Which security principle would best apply to preventing a breach caused by weak network passwords?

    <p>Fix security issues correctly.</p> Signup and view all the answers

    What is the primary focus of conducting a risk assessment of an organization's assets?

    <p>To identify potential threats, risks, and vulnerabilities</p> Signup and view all the answers

    Which of the following is NOT a step in the risk assessment to-do list?

    <p>Evaluate financial profits</p> Signup and view all the answers

    What do administrative controls primarily focus on in cybersecurity?

    <p>Establishing policies and employee responsibilities</p> Signup and view all the answers

    During a controls assessment, what is evaluated to ensure processes are effective?

    <p>The organization's existing assets and their risks</p> Signup and view all the answers

    In terms of cybersecurity, what is the role of physical controls?

    <p>Protecting hardware and physical assets</p> Signup and view all the answers

    What type of controls includes the human component of cybersecurity?

    <p>Administrative controls</p> Signup and view all the answers

    Which of the following actions is part of completing a security audit?

    <p>Assessing compliance and communicating results</p> Signup and view all the answers

    What critical question should be asked when reviewing an audit's goals?

    <p>Which assets are most at risk?</p> Signup and view all the answers

    What type of control is designed to discourage attacks?

    <p>Deterrent Controls</p> Signup and view all the answers

    Which of the following best describes administrative controls?

    <p>They are mostly policy-based guidelines.</p> Signup and view all the answers

    What aligns with the purpose of compliance regulations?

    <p>To ensure the security of private data.</p> Signup and view all the answers

    Which term describes the measures taken to prevent unauthorized physical access to assets?

    <p>Physical Controls</p> Signup and view all the answers

    What is the primary function of detective controls?

    <p>To determine if an incident has occurred or is ongoing.</p> Signup and view all the answers

    Which of the following is included in the communication of internal security audit results?

    <p>An outline of compliance regulations that must be followed.</p> Signup and view all the answers

    What is indicated by the term 'attack vectors'?

    <p>The methods attackers use to breach defenses.</p> Signup and view all the answers

    Which type of control is specifically aimed at restoring an asset after an incident has occurred?

    <p>Corrective Controls</p> Signup and view all the answers

    Study Notes

    Frameworks

    • Plans are put in place to protect against various threats, risks, and vulnerabilities in an organisation.
    • Security frameworks are guidelines to create security policies and processes.
    • Security involves virtual and physical spaces, including building access controls.
    • Frameworks provide guidance for preventing, detecting, and responding to security breaches, especially social engineering attacks like phishing.
    • Employee awareness and training are crucial to minimize breaches.
    • Frameworks plan to address security risks, threats, and vulnerabilities.
    • Controls are used to reduce specific risks.

    Common Security Controls

    • Encryption converts data into an encoded format for confidentiality.
    • Authentication verifies who someone is, including multi-factor authentication (MFA).
    • Authorization grants access to specific resources.
    • The CIA triad (Confidentiality, Integrity, Availability) is a core security model used to protect sensitive data and assets from threat actors.

    CIA Triad

    • Confidentiality means only authorized users access specific assets or data.
    • Integrity means data is correct, authentic, and reliable.
    • Availability means data is accessible to authorized users.
    • Organisations use these principles to establish systems and security policies.

    NIST Frameworks

    • NIST provides cybersecurity frameworks to implement essential cybersecurity practices.
    • Organisations use frameworks as a starting point to mitigate risks, threats, and vulnerabilities to sensitive data and assets.
    • There are two NIST frameworks: CSF and SP 800-53.
    • CSF is a voluntary framework for managing cybersecurity risk, supporting various organisations.
    • SP 800-53 is a framework for protecting the security of information systems within the US federal government.

    NIST Cybersecurity Framework (CSF) - Five Core Functions

    • Identify: Managing cybersecurity risk and its effect on an organisation's people and assets.
    • Protect: Implementing policies, procedures, training, and tools to mitigate risks.
    • Detect: Identifying potential security incidents and improving monitoring capabilities.
    • Respond: Containing, neutralizing, analysing incidents, and implementing improvements.
    • Recover: Returning affected systems to normal operation, restoring data, and assets.

    Security Audit/Planning Elements

    • Auditing is reviewing security controls, policies, and procedures.
    • Two types of audits: internal and external.
    • Internal security audits aim to enhance security posture and prevent fines.
    • Audits involve: defining scope/goals, performing risk assessments, controls assessment, assessing compliance, and communicating results.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential security frameworks and common controls used to protect organizations from various risks and vulnerabilities. Key topics include encryption, authentication, authorization, and the CIA triad, which are vital for ensuring data confidentiality, integrity, and availability. Test your knowledge on how these frameworks and controls function to prevent security breaches.

    More Like This

    Use Quizgecko on...
    Browser
    Browser