Quiz

  1. Nist cybersecurity framework

    This describes how mature an org is when it comes to cybersecurity tech,management and operational packages
    Tiers (show the maturity of the cyber security .These tiers range from partial (tier 1) to adaptive (tier 4)
  2. Provide a Nist Cyber security framework and function 5 ?
    Anomalies and events - detect

    Recovery planning - recover


    Mitigation - respond

    Governance- identify


    Access control - protect
  3. Identify function
    The identify function assists in developing an organizational understanding in managing cyber security risks to systems ,people ,assets ,data and capabilities ,
  4. Center for (Cisc)internet security control
    • The cis controls can be done as long as they are all accomplished prior to a security audit..
    • False

    The cis controls are a prioritized set of security activities
  5. Which controls fit into the basic controls (implementation) group?
    -Hard and software inventory

    -vulnerability management

    -controlling the use of administrator accounts
  6. Which controls fit into the foundational implementation group?
    -Email and web browser security

    -data recovery

    -wireless access
  7. The Nist cybersecurity framework (csf) consists of 5 high level functions and 23 categories
    1-ID -IDENTIFY -asset management,business environment,governance,risk assessment.

    2-Protect -identity management and access control ,data security ,awareness and training

    3-Detect- Anomalies and events , security continuous monitoring

    4-Respond -response planning, communications,analysis ,mitigation

    5- recovery planning , improvements, communications
  8. Nist csf core -functions
    1.identify valuable company assets and data

    2.protect valuable company addy is and days from threats

    3.detect when a cyber incident occurs

    4.respond quickly and efficiently to a cyber incident


    5.recover from an incident and get back to business
  9. Intro to security regulations

    Nist computer security resources center(csrs) special publications found at
    Protecting controlled unclassified information in non - federal systems & organizations

    Developing cyber resell isn’t systems.A systems security engineering approach


    Digital identity guidelines


    Security and privacy controls for information systems and organization



    Computer security incident handling guide
Author
bvxlsvhdals
ID
360808
Card Set
Quiz
Description
Updated