LF11bV2 Deck 5 Flashcards

Betrieb und Sicherheit vernetzter Systeme gewährleisten (67 cards)

1
Q

IT-Risikomanagement

A

Kontinuierlicher Prozess Identifikation Analyse Behandlung Überwachung von IT-Risiken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risikobasierte Ansatz

A

Entscheidungen basierend auf Risikobewertung nicht nur Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Residual Risk

A

Verbleibendes Risiko nach Gegenmaßnahmen Akzeptanz notwendig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Appetite

A

Maximal akzeptierbares Risiko Unternehmen definiert vom Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Tolerance

A

Tatsächliche Risikobereitschaft Abweichung von Appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Qualitative Risikobewertung

A

Hoch Mittel Niedrig Verbal Traffic Light System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Quantitative Risikobewertung

A

Geldwerte ALE Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALE Annualized Loss Expectancy

A

ARO x SLE Annualized Rate of Occurrence x Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ROE Return on Security Investment

A

Kosten-Nutzen-Verhältnis Sicherheitsmaßnahmen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BCP Business Continuity Plan

A

Geschäftskontinuität bei Ausfall RTO RPO definieren

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DRP Disaster Recovery Plan

A

Daten System-Wiederherstellung Backup Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RTO Recovery Time Objective

A

Maximal akzeptierte Ausfallzeit kritische Systeme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPO Recovery Point Objective

A

Maximaler Datenverlust Minuten Stunden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hot Site

A

Vollständig ausgestatteter Replikationsstandort sofort einsatzbereit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Warm Site

A

Teilausstattung Konfiguration vorhanden Update erforderlich

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cold Site

A

Raum Strom Netzwerk vorhanden komplette Ausstattung nötig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chaos Engineering

A

Kontrollierte Ausfälle Test Resilienz Netflix Chaos Monkey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Digital Forensics

A

Wissenschaftliche Untersuchung digitaler Spuren Gerichtsverwertbarkeit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Chain of Custody

A

Dokumentation Beweismittel Integrität Gerichtsverfahren

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Memory Forensics

A

Volatile RAM-Analyse laufender Malware Prozesse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Timeline Analysis

A

Chronologische Rekonstruktion Incident Verlauf Super-Timeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IOC Hunting

A

Suche nach Indicators of Compromise Hash IP Domain YARA Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

YARA Rules

A

Pattern-Matching Regeln Malware IOC Erkennung

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Threat Intelligence

A

Strukturierte Bedrohungsinformationen STIX TAXII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
MITRE ATT&CK Navigator
Taktik-Technik Mapping Incident Coverage
26
Purple Teaming
Red Blue Kollaboration kontinuierliches Lernen
27
Gamification SecOps
CTF Capture The Flag Security Challenges
28
DevSecOps
Security in DevOps-Pipeline Shift Left IaC Security
29
SBOM Software Bill of Materials
Komponentenliste Software Lieferkette
30
SBOM Tools
Syft Grype CycloneDX SPDX Generation Analyse
31
Zero Trust Architecture
Verify Explicitly Never Trust Always Assume Breach
32
ZTNA Zero Trust Network Access
Per-App Zugriff Identity-basierend
33
SASE Secure Access Service Edge
Cloud-native Security Networking Convergence
34
CASB Cloud Access Security Broker
SaaS Shadow IT DLP CASB
35
CSPM Cloud Security Posture Management
Cloud-Konfigurationsfehler Erkennung
36
CNAPP Cloud Native Application Protection Platform
CSPM CWPP Convergence
37
CWPP Cloud Workload Protection Platform
Container Kubernetes Runtime Security
38
FAISS Federated AI Security Information Sharing
Bedrohungsinfos anonymisiert teilen
39
XDR Extended Detection Response
Multi-Source Korrelation EDR NDR SIEM
40
NDR Network Detection Response
Netzwerk-basierte Threat Detection ML
41
UEBA User Behavior Analytics
Insider Threat Erkennung ML-basierend
42
SOAR Playbooks
Automatisierte Incident Response Workflows
43
Attack Surface Management
Externe Assets Scannen ASM Continuous
44
Dark Web Monitoring
Forum Leak Monitoring Credential Stuffing
45
Brand Protection
Domain Phishing Site Take-down Monitoring
46
Supply Chain Risk Management
Vendor Assessment Third-Party Risk
47
GRC Governance Risk Compliance
Policy Management Audit Trail
48
GXP GMP GAMP5
Pharma Life Sciences Compliance Validierung
49
FedRAMP
US Federal Cloud Authorization Standards
50
CISA Known Exploited Vulnerabilities
US Agency CISA aktiv ausgenutzte Schwachstellen
51
Supply Chain Levels for Software
SLSA Integrity Guarantees Build Pipeline
52
SBOM Attestation
Signierte Komponentenliste Integrität Supply Chain
53
Critical Design Review
Architektur Security Review vor Entwicklung
54
Threat Modeling
STRIDE DREAD Attack Trees Design Phase
55
Privacy by Design
Datenschutz Entwicklungsintegration GDPR Art.25
56
Secure SDLC
Security in gesamtem Software Development Lifecycle
57
Container Image Scanning
Docker Registry Scans Vulnerabilities Malware
58
Kubernetes RBAC
Role-Based Access Control Namespaces ServiceAccounts
59
Istio Service Mesh
Zero Trust Networking mTLS Observability
60
eBPF Extended Berkeley Packet Filter
Kernel Tracing Security Observability
61
Falco Runtime Security
Container Cloud-Native Intrusion Detection
62
Tetragon eBPF-based Security
Kubernetes Observability Enforcement
63
Wazuh Open Source SIEM
Endpoint Log Management Compliance
64
OSSEC Host-based IDS
File Integrity Rootkit Detection
65
Suricata Network IDS IPS
Multi-Threaded Signature Anomaly Detection
66
Zeek Bro IDS
Network Analysis Protocol Parsing
67
Elastic Security
ELK Stack SIEM Endpoint ML