100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

1A and 1B: Comparing Security Roles and Security Controls

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
29-01-2025
Written in
2024/2025

1A and 1B: Comparing Security Roles and Security Controls **Information Security (Infosec)** - refers to the safeguarding of data resources against unauthorized access, attacks, theft, or damage. **What is the CIA Triad?** - consists of Confidentiality, Integrity, and Availability. **What is Confidentiality? (CIA Triad)** - represents the essential security objective of maintaining the privacy of information and communications, ensuring they are shielded from unauthorized access. This means that specific information should only be accessible to designated individuals. **What is Integrity? (CIA Triad)** - signifies the primary security aim of ensuring that organizational information remains accurate, error-free, and free from unauthorized alterations. This entails that data is stored and transmitted as intended, with modifications permitted only by authorized entities. **What is Availability? (CIA Triad)** - denotes the core security goal of guaranteeing that computer systems function continuously, allowing authorized users to access the data they require. In essence, information should be readily available to those who have permission to view or modify it. **Non-repudiation** - refers to the assurance that an individual cannot deny their actions, such as creating, altering, or transmitting a resource. **What are the 5 Functions of Security as Developed by NIST?** - include Identify, Protect, Detect, Respond, and Recover. **Describe Identify from the 5 Functions of Security Developed by NIST** - involves creating secure policies and capabilities, assessing risks, threats, and vulnerabilities, and recommending security controls to address them. **Describe Protect from the 5 Functions of Security Developed by NIST** - entails the procurement, development, installation, operation, and decommissioning of IT hardware and software assets, with security integrated at every phase of the operational lifecycle. **Describe Detect from the 5 Functions of Security Developed by NIST** - involves continuous, proactive monitoring to verify that security controls are effective and capable of defending against emerging threats. **Describe Respond from the 5 Functions of Security Developed by NIST** - encompasses the identification, analysis, containment, and elimination of data security threats. **Describe Recover from the 5 Functions of Security Developed by NIST** - focuses on implementing cybersecurity resilience to restore systems and data when other controls fail to prevent attacks. **What is an SOC (Security Operations Center)?** - a facility where security professionals oversee and safeguard critical information assets across various business functions, including finance, operations, and sales. **What is DevSecOps?** - an approach that merges software development, security operations, and systems operations, emphasizing that security must be a fundamental consideration throughout the software development and deployment lifecycle. **What is DevOps?** - a practice that integrates software development with systems operations, promoting collaboration between these two disciplines. **What is a CIRT/CSIRT/CERT? What do they do?** - these terms refer to dedicated teams for cyber incident response, providing a centralized point of contact for reporting security incidents. **Which security-related term pertains to data integrity?** - Modification. **A company engages an external firm annually to audit its network security. What type of security control does this audit exemplify?** - Managerial. **Which organization has a cybersecurity framework (CSF) that focuses solely on IT security, as opposed to IT service delivery?** - National Institute of Standards and Technology (NIST). **Following a poorly managed security breach, a company revises its security policy to enhance its incident response plan. Which type of security control does this update represent?** - Corrective. **An engineer aims to implement security measures based on the five functions of the NIST Cybersecurity Framework. What should the engineer emphasize when documenting the "detect" function?** - Ongoing proactive monitoring. **The _____ mandates that federal agencies establish security policies for computer systems handling confidential information.** - Computer Security Act. **After attending a conference on cybersecurity frameworks, the IT department head schedules a meeting with staff to discuss deploying security controls. Which ideas align with industry definitions? (Select all that apply.)** - Implement a technical control to enforce network access policies; schedule quarterly security awareness workshops to prevent social engineering attacks; deploy agents to file servers for continuous backups to cloud storage as a corrective measure against malware. **The National Institute of Standards and Technology (NIST) outlines a framework categorizing security functions. Which description corresponds to the "respond" function?** - Identify, analyze, and eradicate threats. **Who holds the primary external responsibility for an organization’s security?** - Senior executive

Show more Read less
Institution
1A And 1B: Comparing Sec
Course
1A and 1B: Comparing Sec









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
1A and 1B: Comparing Sec
Course
1A and 1B: Comparing Sec

Document information

Uploaded on
January 29, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1A and 1B: Comparing Security Roles and
Security Controls
**Information Security (Infosec)** - refers to the safeguarding of data resources against unauthorized
access, attacks, theft, or damage.

**What is the CIA Triad?** - consists of Confidentiality, Integrity, and Availability.

**What is Confidentiality? (CIA Triad)** - represents the essential security objective of maintaining the
privacy of information and communications, ensuring they are shielded from unauthorized access. This
means that specific information should only be accessible to designated individuals.

**What is Integrity? (CIA Triad)** - signifies the primary security aim of ensuring that organizational
information remains accurate, error-free, and free from unauthorized alterations. This entails that data is
stored and transmitted as intended, with modifications permitted only by authorized entities.

**What is Availability? (CIA Triad)** - denotes the core security goal of guaranteeing that computer
systems function continuously, allowing authorized users to access the data they require. In essence,
information should be readily available to those who have permission to view or modify it.

**Non-repudiation** - refers to the assurance that an individual cannot deny their actions, such as
creating, altering, or transmitting a resource.

**What are the 5 Functions of Security as Developed by NIST?** - include Identify, Protect, Detect,
Respond, and Recover.

**Describe Identify from the 5 Functions of Security Developed by NIST** - involves creating secure
policies and capabilities, assessing risks, threats, and vulnerabilities, and recommending security controls
to address them.

**Describe Protect from the 5 Functions of Security Developed by NIST** - entails the procurement,
development, installation, operation, and decommissioning of IT hardware and software assets, with
security integrated at every phase of the operational lifecycle.

**Describe Detect from the 5 Functions of Security Developed by NIST** - involves continuous, proactive
monitoring to verify that security controls are effective and capable of defending against emerging
threats.

**Describe Respond from the 5 Functions of Security Developed by NIST** - encompasses the
identification, analysis, containment, and elimination of data security threats.

**Describe Recover from the 5 Functions of Security Developed by NIST** - focuses on implementing
cybersecurity resilience to restore systems and data when other controls fail to prevent attacks.

, **What is an SOC (Security Operations Center)?** - a facility where security professionals oversee and
safeguard critical information assets across various business functions, including finance, operations, and
sales.

**What is DevSecOps?** - an approach that merges software development, security operations, and
systems operations, emphasizing that security must be a fundamental consideration throughout the
software development and deployment lifecycle.

**What is DevOps?** - a practice that integrates software development with systems operations,
promoting collaboration between these two disciplines.

**What is a CIRT/CSIRT/CERT? What do they do?** - these terms refer to dedicated teams for cyber
incident response, providing a centralized point of contact for reporting security incidents.

**Which security-related term pertains to data integrity?** - Modification.

**A company engages an external firm annually to audit its network security. What type of security
control does this audit exemplify?** - Managerial.

**Which organization has a cybersecurity framework (CSF) that focuses solely on IT security, as opposed
to IT service delivery?** - National Institute of Standards and Technology (NIST).

**Following a poorly managed security breach, a company revises its security policy to enhance its
incident response plan. Which type of security control does this update represent?** - Corrective.

**An engineer aims to implement security measures based on the five functions of the NIST
Cybersecurity Framework. What should the engineer emphasize when documenting the "detect"
function?** - Ongoing proactive monitoring.

**The _____ mandates that federal agencies establish security policies for computer systems handling
confidential information.** - Computer Security Act.

**After attending a conference on cybersecurity frameworks, the IT department head schedules a
meeting with staff to discuss deploying security controls. Which ideas align with industry definitions?
(Select all that apply.)** - Implement a technical control to enforce network access policies; schedule
quarterly security awareness workshops to prevent social engineering attacks; deploy agents to file
servers for continuous backups to cloud storage as a corrective measure against malware.

**The National Institute of Standards and Technology (NIST) outlines a framework categorizing security
functions. Which description corresponds to the "respond" function?** - Identify, analyze, and eradicate
threats.

**Who holds the primary external responsibility for an organization’s security?** - Senior executives.
$8.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
wilberforce

Get to know the seller

Seller avatar
wilberforce Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
289
Last sold
11 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions