100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

1A and 1B: Comparing Security Roles and Security Controls

Puntuación
-
Vendido
-
Páginas
11
Grado
A+
Subido en
29-01-2025
Escrito en
2024/2025

1A and 1B: Comparing Security Roles and Security Controls **Information Security (Infosec)** - refers to the safeguarding of data resources against unauthorized access, attacks, theft, or damage. **What is the CIA Triad?** - consists of Confidentiality, Integrity, and Availability. **What is Confidentiality? (CIA Triad)** - represents the essential security objective of maintaining the privacy of information and communications, ensuring they are shielded from unauthorized access. This means that specific information should only be accessible to designated individuals. **What is Integrity? (CIA Triad)** - signifies the primary security aim of ensuring that organizational information remains accurate, error-free, and free from unauthorized alterations. This entails that data is stored and transmitted as intended, with modifications permitted only by authorized entities. **What is Availability? (CIA Triad)** - denotes the core security goal of guaranteeing that computer systems function continuously, allowing authorized users to access the data they require. In essence, information should be readily available to those who have permission to view or modify it. **Non-repudiation** - refers to the assurance that an individual cannot deny their actions, such as creating, altering, or transmitting a resource. **What are the 5 Functions of Security as Developed by NIST?** - include Identify, Protect, Detect, Respond, and Recover. **Describe Identify from the 5 Functions of Security Developed by NIST** - involves creating secure policies and capabilities, assessing risks, threats, and vulnerabilities, and recommending security controls to address them. **Describe Protect from the 5 Functions of Security Developed by NIST** - entails the procurement, development, installation, operation, and decommissioning of IT hardware and software assets, with security integrated at every phase of the operational lifecycle. **Describe Detect from the 5 Functions of Security Developed by NIST** - involves continuous, proactive monitoring to verify that security controls are effective and capable of defending against emerging threats. **Describe Respond from the 5 Functions of Security Developed by NIST** - encompasses the identification, analysis, containment, and elimination of data security threats. **Describe Recover from the 5 Functions of Security Developed by NIST** - focuses on implementing cybersecurity resilience to restore systems and data when other controls fail to prevent attacks. **What is an SOC (Security Operations Center)?** - a facility where security professionals oversee and safeguard critical information assets across various business functions, including finance, operations, and sales. **What is DevSecOps?** - an approach that merges software development, security operations, and systems operations, emphasizing that security must be a fundamental consideration throughout the software development and deployment lifecycle. **What is DevOps?** - a practice that integrates software development with systems operations, promoting collaboration between these two disciplines. **What is a CIRT/CSIRT/CERT? What do they do?** - these terms refer to dedicated teams for cyber incident response, providing a centralized point of contact for reporting security incidents. **Which security-related term pertains to data integrity?** - Modification. **A company engages an external firm annually to audit its network security. What type of security control does this audit exemplify?** - Managerial. **Which organization has a cybersecurity framework (CSF) that focuses solely on IT security, as opposed to IT service delivery?** - National Institute of Standards and Technology (NIST). **Following a poorly managed security breach, a company revises its security policy to enhance its incident response plan. Which type of security control does this update represent?** - Corrective. **An engineer aims to implement security measures based on the five functions of the NIST Cybersecurity Framework. What should the engineer emphasize when documenting the "detect" function?** - Ongoing proactive monitoring. **The _____ mandates that federal agencies establish security policies for computer systems handling confidential information.** - Computer Security Act. **After attending a conference on cybersecurity frameworks, the IT department head schedules a meeting with staff to discuss deploying security controls. Which ideas align with industry definitions? (Select all that apply.)** - Implement a technical control to enforce network access policies; schedule quarterly security awareness workshops to prevent social engineering attacks; deploy agents to file servers for continuous backups to cloud storage as a corrective measure against malware. **The National Institute of Standards and Technology (NIST) outlines a framework categorizing security functions. Which description corresponds to the "respond" function?** - Identify, analyze, and eradicate threats. **Who holds the primary external responsibility for an organization’s security?** - Senior executive

Mostrar más Leer menos
Institución
1A And 1B: Comparing Sec
Grado
1A and 1B: Comparing Sec

Vista previa del contenido

1A and 1B: Comparing Security Roles and
Security Controls
**Information Security (Infosec)** - refers to the safeguarding of data resources against unauthorized
access, attacks, theft, or damage.

**What is the CIA Triad?** - consists of Confidentiality, Integrity, and Availability.

**What is Confidentiality? (CIA Triad)** - represents the essential security objective of maintaining the
privacy of information and communications, ensuring they are shielded from unauthorized access. This
means that specific information should only be accessible to designated individuals.

**What is Integrity? (CIA Triad)** - signifies the primary security aim of ensuring that organizational
information remains accurate, error-free, and free from unauthorized alterations. This entails that data is
stored and transmitted as intended, with modifications permitted only by authorized entities.

**What is Availability? (CIA Triad)** - denotes the core security goal of guaranteeing that computer
systems function continuously, allowing authorized users to access the data they require. In essence,
information should be readily available to those who have permission to view or modify it.

**Non-repudiation** - refers to the assurance that an individual cannot deny their actions, such as
creating, altering, or transmitting a resource.

**What are the 5 Functions of Security as Developed by NIST?** - include Identify, Protect, Detect,
Respond, and Recover.

**Describe Identify from the 5 Functions of Security Developed by NIST** - involves creating secure
policies and capabilities, assessing risks, threats, and vulnerabilities, and recommending security controls
to address them.

**Describe Protect from the 5 Functions of Security Developed by NIST** - entails the procurement,
development, installation, operation, and decommissioning of IT hardware and software assets, with
security integrated at every phase of the operational lifecycle.

**Describe Detect from the 5 Functions of Security Developed by NIST** - involves continuous, proactive
monitoring to verify that security controls are effective and capable of defending against emerging
threats.

**Describe Respond from the 5 Functions of Security Developed by NIST** - encompasses the
identification, analysis, containment, and elimination of data security threats.

**Describe Recover from the 5 Functions of Security Developed by NIST** - focuses on implementing
cybersecurity resilience to restore systems and data when other controls fail to prevent attacks.

, **What is an SOC (Security Operations Center)?** - a facility where security professionals oversee and
safeguard critical information assets across various business functions, including finance, operations, and
sales.

**What is DevSecOps?** - an approach that merges software development, security operations, and
systems operations, emphasizing that security must be a fundamental consideration throughout the
software development and deployment lifecycle.

**What is DevOps?** - a practice that integrates software development with systems operations,
promoting collaboration between these two disciplines.

**What is a CIRT/CSIRT/CERT? What do they do?** - these terms refer to dedicated teams for cyber
incident response, providing a centralized point of contact for reporting security incidents.

**Which security-related term pertains to data integrity?** - Modification.

**A company engages an external firm annually to audit its network security. What type of security
control does this audit exemplify?** - Managerial.

**Which organization has a cybersecurity framework (CSF) that focuses solely on IT security, as opposed
to IT service delivery?** - National Institute of Standards and Technology (NIST).

**Following a poorly managed security breach, a company revises its security policy to enhance its
incident response plan. Which type of security control does this update represent?** - Corrective.

**An engineer aims to implement security measures based on the five functions of the NIST
Cybersecurity Framework. What should the engineer emphasize when documenting the "detect"
function?** - Ongoing proactive monitoring.

**The _____ mandates that federal agencies establish security policies for computer systems handling
confidential information.** - Computer Security Act.

**After attending a conference on cybersecurity frameworks, the IT department head schedules a
meeting with staff to discuss deploying security controls. Which ideas align with industry definitions?
(Select all that apply.)** - Implement a technical control to enforce network access policies; schedule
quarterly security awareness workshops to prevent social engineering attacks; deploy agents to file
servers for continuous backups to cloud storage as a corrective measure against malware.

**The National Institute of Standards and Technology (NIST) outlines a framework categorizing security
functions. Which description corresponds to the "respond" function?** - Identify, analyze, and eradicate
threats.

**Who holds the primary external responsibility for an organization’s security?** - Senior executives.

Escuela, estudio y materia

Institución
1A and 1B: Comparing Sec
Grado
1A and 1B: Comparing Sec

Información del documento

Subido en
29 de enero de 2025
Número de páginas
11
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$9.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
wilberforce

Conoce al vendedor

Seller avatar
wilberforce Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
1 año
Número de seguidores
0
Documentos
289
Última venta
1 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes