CCSA Training Flashcards

(192 cards)

1
Q

Framework Profile represents

A

Represents the outcomes based on business needs an organization has selected from the Framework Categories and Subcategories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Current Profile

A

Indicated the cyber security outcomes that are currently being achieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Target Profile

A

Indicates the outcomes needed to achieve the desired cyber security risk management goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the tiers of Framework implementation?

A
  1. Partial
  2. Risk Informed
  3. Repeatable
  4. Adaptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the partial risk management process?

A

Organizational cyber security risk management practices are not formalized, and risk is managed in an ad how and sometimes reactive manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Partial Integrated Risk Management Program?

A

There is limited awareness of cyber security risk at the organizational level and an organizational-wide approach to managing cyber security risk has not been established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Partial External Partcipation

A

The organization is usually unaware of the cyber supply chain risks of the products and services it provides and that it uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Informed (Risk Management)

A

Prioritization of cyber security is directly informed by organizational risk objectives, the threat environment, or business/mission requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Informed (Integrated Risk Management Program)

A

Cyber security is shared within the organization on an informal basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Informed(External Participation)

A

The organization collaborated with and receives some information from other entities and generated some of its own information, but may not share information with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Repeatable (Risk Management Process)

A

Organizational cyber security practices are regularly updated based on the application of risk management processes to changes in business/mission requirements and a changing threat and technology landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Repeatable (Integrated Risk Management Program)

A

Risk-Informed policies, processes, and procedures are defined implemented as intended, and reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Repeatable (External Partcipation)

A

It collaborates with and receives information from other entities regularly that complements internally generated information, and shares information with other entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adaptive (Risk Management Process)

A

The organization adapts its cybersecurity practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaptive (Integrated Risk Management Program)

A

The organization can quickly and efficiently account for changes to business/mission objectives in how risk is approached and communicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adaptive (External Participation)

A

The organization understands its role, dependencies, and dependents in the larger ecosystem and contributes to the community’s broader understanding of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Functions

A

Organize basic cybersecurity activities at their highest level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Categories

A

Are the subdivisions of a function into groups of cybersecurity outcomes closely tied to programmatic needs and particular activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Subcategories

A

Further divide a category into specific outcomes of technical and/or management activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Informative References

A

Are specific sections of standards, guidelines, and practices common among critical infrastructure sectors that illustrate a method to achieve the outcomes associated with each subcategory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

5 types of cybersecurity framework

A
  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify

A

Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protect

A

Develop and implement appropriate safeguards to ensure delivery of critical services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Detect

A

Develop and implement appropriate activities to identify the occurrence of a cybersecurity event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Respond
Develop and implement appropriate activities to take action regarding a detected cybersecurity incident
26
Recover
Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.
27
NIST Cybersecurity Framework
1. Profile 2. Tiers 3. Functions 4. Categories 5. Subcategories 6. Informative References
28
Two types of profiles
Current and Target
29
Framework Core Structures
Categories are made up of subcategories and subcategories are made up of informative references/
30
Framework Functions
Identify ID, Protect PR, Detect DE, Respond RS, and Recover RC
31
Identify categories
Asset management, business environment, governance, risk assessment, risk management strategy, and supply chain risk management
31
Protect categories
Identify management and access controls, awareness and training, data security, information protection process and procedures, maintenance , and protective technology.
31
Detect categories
Anomalies and events, security continuous and monitoring, and detection processes
32
Respond categories
Response planning, communications, analysis, mitigation, and improvements
33
Recover categories
Recovery planning, improvements, and communications
34
Cybersecurity framework
1. Identify 2. Protect 3. Detect 4. Respond 5. Recover
35
CEA
Cybersecurity Enhancement Act of 2014
36
CIS
Center for Internet Security
37
COBIT
Control Objectives for Information and Related Technology
38
CSC
Critical Security Control
39
DHS
Department of Homeland Security
40
EO
Executive Order
41
IEC
International Electrotechnical Commission
42
IR
Interagency Report
43
ISO
International Organization for Standardization
44
OT
Operational Technology
45
RFI
Request for Information
46
RMP
Risk Management Process
47
SCRM
Supply Chain Risk Management
48
SP
Special Publication
49
DoD
Department of Defense
50
How many Domains are in CMMC?
17
51
DIB
Defense Industrial Base
52
How many level descriptions are there in CMMC?
5
53
CMMC
Cybersecurity Maturity Model Certification
54
DFARS
Defense Federal Acquisition Regulation Supplement
55
CUI
Controlled Unclassified Information
56
Definition of CMMC
Certification process that measures DIB sector company’s ability to protect FCI and CUI.
57
FCI
Federal Contract Information
58
CMMC Model Framework
Models consists of domains, domains consist of capabilities, and capabilities consist of practices and processes
59
How many capabilities in CMMC?
43
60
Level 1 of CMMC process
Performed
61
Level 1 Practices of CMMC?
Basic Cyber Hygiene
62
Level 2 of Processes (CMMC)
Documented
63
CMMC Level 2 Practices
Intermediate Cyber Hygiene
64
CMMC Level 3 Processes
Managed
65
CMMC Level 3 Practices
Good Cyber Engine
66
CMMC Level 4 Processes
Reviewed
67
CMMC Level 4 Practices
Proactive
68
CMMC Level 5 Processes
Optimizing
69
CMMC Level 5 Practices
Advanced/Progressive
70
Level 1 focuses on
The protection of FCI and consists only of practices that correspond to the basic safeguarding requirements specified
71
Level 2 requires
An organization that can establish and document practices and policies to guide the implementation of their CMMC efforts
72
Level 3 requires
An organization establish, maintain, and resource a plan demonstrating the management of activities for practice implementation
73
Level 3 focuses on
The protection of CUI
74
Level 4 requirements
An organization review and measure practices for effectiveness
75
Level 4 focuses on
The protection of CUI from the APTs and encompasses a subset of enhanced security requirements
76
Level 5 requires
An organization to standardize and optimize process implementation across the organization
77
Level 5 focuses on
The protection of CUI from the APTs
78
CMMC Domain 1
Access Control
79
CMMC Domain 2
Asset Management
80
CMMC Domain 3
Audit and Accountability
81
CMMC Domain 4
Awareness and Training
82
CMMC Domain 5
Configuration Management
83
CMMC Domain 6
Identification Authentication
84
CMMC Domain 7
Incident Responses
85
CMMC Domain 8
Maintenance
86
CMMC Domain 9
Media Protection
87
CMMC Domain 10
Personal Security
88
CMMC Domain 11
Physical Protection
89
CMMC Domain 12
Recovery
90
CMMC Domain 13
Risk Management
91
CMMC Domain 14
Security Assessment
92
CMMC Domain 15
Situational Awareness
93
CMMC Domain 16
System and Communications Protections
94
CMMC Domain 17
System and Information Integrity
95
C###
Capability number ###
96
CERT
Computer Emergency Response Team
97
CFR
Code of Federal Regulations
98
CIS
Center for Internet Security
99
CMMC
Cybersecurity Maturity Model Certification
100
CNSSI
Committee on National Security Systems Instructionss
101
CSF
Cybersecurity Feamework
102
CSP
Credential Service Provider
103
CUI
Controlled Unclassified Information
104
CVE
Common Vulnerabilities and Exposures
105
DFARS
Defense Federal Acquisition Regulation Supplement
106
DNS
Domain Name System
107
FAR
Federal Acquisition Regulation
108
FCI
Federal Contact Information
109
FIPS
Federal Information Processing Standards
110
IEC
International Electrotechnical Commission
111
ISO
International Organization for Standardization
112
ISCM
Information Security Continuous Monitoring
113
L#
Level number #
114
MA
Maintenance
115
ML
Maturity Level
116
ML#
Maturity Level number #
117
MP
Media Protection
118
N/A
Not Applicable
119
NAS
National Aerospace Standard
120
NCSC
National Cyber Security Standard
121
NCSC
National Cyber Security Centre
122
NISTIR
NIST Interagency Report
123
OUSD AandS
Office of the Under Secretary of Defense for Acquisition and Sustainment
124
TTP
Tactics, techniques, and procedures
125
UK
United Kingdom
126
URL
Uniform Resource Locator
127
US
United States
128
VolP
Voice over Internet Protocol
129
Col
Volume
130
NIST SP 800-171 R2 Purpose
To provide federal agencies with recommended security requirements for protecting the confidentiality of CUI
131
NIST SP 800-171 Target Audience
Public and Private sectors
132
CUI
Controlled Unclassified Information
133
CUI Definition
A non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls directed at securing sensitive government information
134
Basic security requirements section
Are obtained from FIPS 200 which provides the high-level and fundamental security requirements for federal information and systems
135
Derived security requirement actions
Supplement the basic security requirements, are taken from security controls in SP 800-53
136
How many Distinct Categories are there?
14
137
What are the 14 Distinct Categories?
Access Control, Awareness and Training, Audit and Accountability, Configuration Management, Identification and Authentication, Incident Response, Maintenance, System and Information Integrity, System and Communications Protections, Security Assessment, Risk Assessment, Physical Protection, Personnel Protection, and Media Protection
138
CSIRT responsible for?
Providing incident response services to part or all of an organization.
139
CSIRT
Computer Security Incident Response Team
140
Incident Response Plan provides
The roadmap for implanting the incident response capability
141
SOP
Standard Operating Procedures
142
SOP Definition
Are a delineation of the specific technical processes techniques, checklists, and forms used by the incident response team
143
Incident Response Team
Law Enforcement Agencies, Software and Support Vendors, Customer, Constituents and Media, Other Incident Response Team, Internet Service Provider, and Incident Reporters
144
Incident Response Life Cycle
Preparation, Detection & Analysis, Containment Eradication & Recovery, and Post-Incident Activity
145
None
No effect to the organization’s ability to provide all services to all users
146
Low
Minimal effect
147
Medium
Organization has lost the ability to provide a critical service to a subset of system users
148
High
Organization is no longer able to provide some critical services to any users
149
Four Areas Covered in Incident Security
Preparation, Detection & Analysis, Containment, Eradication & Recovery, and Post Incident Activity
150
NIST and Risk Assessment
Scope of Risk Assessment, Asset Inventory, Threats, Vulnerabilities, Risk Evaluation, Risk Treatment, Version History, and Executive Summary
151
Risk Assessment Process
1. Prepare for Assessment 2. Conduct the Assessment 3. Communicate results 4. Maintain Assessment
152
Vulnerability Assessment
Process of identifying, quantifying and prioritizing the security issues in a system or network.
153
Issues to look for
Data Access vulnerabilities and Network Access vulnerabilities
154
4 ways to address a risk
Eliminate the risk, Reduce the risk to an acceptable level, Transfer the risk to a third-party, and to Accept the risk
155
Vulnerability Scan
Runs internal and external network vulnerability scans at least quarterly and after any significant change in the network
156
Internal Vulnerability Scans
Perform quarterly internal scan and rescans as needed until all “high” risk vulnerabilities are resolved
157
External Vulnerability
Performs rescans as needed until passing scans are achieved
158
Wireless Assessment
Implement processes to test for the presence of wireless access points, and detect and identify all authorized and unauthorized wireless access points on a quarterly basis
159
Penetration Testing main objective
To determine security weaknesses
160
External Penetration Testing Goal
To gain unauthorized elevated access to an externally accessible system
161
Web Application Penetration Testing
Gain anonymous access to authenticated sections of the application and to gain access to other client data within the application
162
Penetration Testing goals
Determine whether and how a malicious user can gain unauthorized access to assets that affect the fundamental security of the system, files, and logs
163
Internal Pen test
Perform penetration test at least annually and after any significant infrastructure or application upgrade or modification
164
Exploitable Vulnerabilities
Found during penetration testing mush be reviewed and corrected
165
Detect and Prevent Intrusions
Used to detect or prevent intrusions of the network
166
Change-Detection Mechanism
To alert personnel to unauthorized modification of critical system files, configuration files, or content files
167
Firewalls
Are devices that control computer traffic allowed between an entity’s networks and untrusted network as well as traffic into and out of more sensitive areas within an entity’s internal trusted networks
168
DMZ
Demilitarized Zone
169
Information Security Policies
Develop and secure approval from management, publish, and communicate and train all members of the workforce on an information security policy
170
Review of the Policies for Information Security
Are it be reviewed and evaluated periodically and if changes occur within the facility that affects a particular approved policy statement
171
Organization of Information Security
Information security roles and responsibilities, segregation of duties, contact with authorities and Contact with special interest groups, and Information security in project management
172
Mobile device policy
Develop specific policies, plans, and procedures to address members of the workforce who use mobile devices
173
Risk Assessment
Conduct an accurate and through the assessment of risk and vulnerabilities to the CIA of sensitive information, including PII
174
Risk Management
Obtain timely information about technical vulnerabilities of information systems being used
175
Risk Management definition
A timeline to react to notifications of potentially relevant technical vulnerabilities
176
Breach notification
Establish a formal information security even reporting procedure
177
Information Security Incident Management
Implement training that augments the certification or other qualifications of workforce members and use tools so as to strengthen the value of preserved evidence.
178
ISO 27001 Requirement # 10
Cryptography
179
Cryptography Objective
To ensure proper and effective use of cryptography to protect the CIA of Information
180
ISO 27001 Requirement # 12.3
Cryptographic Controls
181
Cryptographic Controls Objective
To protect the CIA of information by cryptographic means
182
ISO 27001 Requirement #18.1.5
Regulation Cryptographic Controls
183
Regulation Cryptographic Controls Objective
To avoid breaches of legal, statutory, regulatory, or contractual obligations related to information security and of any security requirements
184
Protected stored Cardholder Data
Protection methods such as encryption, truncation, masking, and hashing are critical components of cardholder data protection
185
Encrypt Transmission
Encrypt transmission of sensitive data across open, public networks
186
NIST offers
Guidance for encryption data at rest and in transmit
187
Encryption
Is the conversation of data into a form that cannot be read with the decryption key or password.
188
Tow addressable IS related to encryptions?
Access and Control Standard & Transmission Security Standard
189
Purpose of Encryption Policy
To implement a mechanism to encrypt sensitive information in transmit, storage, usage, or processing, whenever deemed appropriate
190
Encryption Policy
Evaluate the need for and use of encryption to maintain the confidentiality and integrity of sensitive information being transmitted, stored, used, or processed