Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

RISK MANAGEMENT FRAMEWORK (RMF) OVERVIEW AND CONCEPTS

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
26-04-2025
Escrito en
2024/2025

RISK MANAGEMENT FRAMEWORK (RMF) OVERVIEW AND CONCEPTSRISK MANAGEMENT FRAMEWORK (RMF) OVERVIEW AND CONCEPTSRISK MANAGEMENT FRAMEWORK (RMF) OVERVIEW AND CONCEPTS Advanced Persistent Threat (APT) - ANSWER-A threat that pursues its objectives repeatedly over an extended period of time; adapts to defenders' efforts to resist it; and is determined to maintain the level of interaction needed to execute its objectives. Authenticity - ANSWER-The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. Authorization (to operate) - ANSWER-The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations based on the implementation of an

Mostrar más Leer menos
Institución
RISK MANAGEMENT FRAMEWORK OVERVIEW AND CONCE
Grado
RISK MANAGEMENT FRAMEWORK OVERVIEW AND CONCE

Vista previa del contenido

RISK MANAGEMENT FRAMEWORK
(RMF) OVERVIEW AND CONCEPTS
Advanced Persistent Threat (APT) - ANSWER-A threat that pursues its objectives
repeatedly over an extended period of time; adapts to defenders' efforts to resist it; and
is determined to maintain the level of interaction needed to execute its objectives.

Authenticity - ANSWER-The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message originator.

Authorization (to operate) - ANSWER-The official management decision given by a
senior organizational official to authorize operation of an information system and to
explicitly accept the risk to organizational operations based on the implementation of an
agreed-upon set of security controls.

Certification - ANSWER-A comprehensive assessment of the management, operational,
and technical security controls in an information system, made in support of security
accreditation, to determine the extent to which the controls are implemented correctly,
operating as intended, and producing the desired outcome with respect to meeting the
security requirements for the system.

Community of Interest - ANSWER-A collaborative group of users who exchange
information in pursuit of their shared goals, interests, missions, or business processes,
and who therefore must have a shared vocabulary for the information they exchange.

General Support System - ANSWER-An interconnected set of information resources
under the same direct management control that shares common functionality. It
normally includes hardware, software, information, data, applications, communications,
and people.

Individual - ANSWER-A citizen of the United States or an alien lawfully admitted for
permanent residence.

Integrity - ANSWER-Guarding against improper information modification or destruction,
and includes ensuring information non-repudiation and authenticity.

Major Application - ANSWER-An application that requires special attention to security
due to the risk and magnitude of harm resulting from the loss, misuse, or unauthorized
access to or modification of the information in the application.

Mission/Business Segment - ANSWER-Elements of organizations describing mission
areas, common/shared business services, and organization-wide services.

,National Security Information - ANSWER-Information that has been determined to
require protection against unauthorized disclosure and is marked to indicate its
classified status.

National Security System - ANSWER-Any information system (including any
telecommunications system) used or operated by an agency or by a contractor of an
agency, or other organization on behalf of an agency.

Net-Centric Architecture - ANSWER-A complex system of systems composed of
subsystems and services that are part of a continuously evolving, complex community
of people, devices, information and services interconnected by a network that enhances
information sharing and collaboration. Subsystems and services may or may not be
developed or owned by the same entity, and, in general, will not be continually present
during the full life cycle of the system of systems. Examples of this architecture include
service-oriented architectures and cloud computing architectures.

Organization - ANSWER-An entity of any size, complexity, or positioning within an
organizational structure (e.g., a federal agency, or, as appropriate, any of its operational
elements).

Predisposing Condition - ANSWER-A condition that exists within an organization, a
mission/business process, enterprise architecture, or information system including its
environment of operation, which contributes to (i.e., increases or decreases) the
likelihood that one or more threat events, once initiated, will result in undesirable
consequences or adverse impact to organizational operations and assets, individuals,
other organizations, or the Nation.

Supply Chain - ANSWER-A system of organizations, people, activities, information, and
resources, possibly international in scope, that provides products or services to
consumers.

Threat - ANSWER-Any circumstance or event with the potential to adversely impact
organizational operations (including mission, functions, image, or reputation),
organizational assets, individuals, other organizations, or the Nation through an
information system via unauthorized access, destruction, disclosure, modification of
information, and/or denial of service.

Threat Assessment - ANSWER-Process of formally evaluating the degree of threat to
an information system or enterprise and describing the nature of the threat.

Threat Event - ANSWER-An event or situation that has the potential for causing
undesirable consequences or impact.

Threat Scenario - ANSWER-A set of discrete threat events, associated with a specific
threat source or multiple threat sources, partially ordered in time.

, Threat Source - ANSWER-The intent and method targeted at the intentional exploitation
of a vulnerability or a situation and method that may accidentally trigger a vulnerability.
Synonymous with Threat Agent.

Interview - ANSWER-A type of assessment method that is characterized by the process
of conducting discussions with individuals or groups within an organization to facilitate
understanding, achieve clarification, or lead to the location of evidence, the results of
which are used to support the determination of security control effectiveness over time.

Media - ANSWER-Physical devices or writing surfaces including but not limited to
magnetic tapes, optical disks, magnetic disks, Large Scale Integration (LSI) memory
chips, and printouts (but not including display media) onto which information is
recorded, stored, or printed within an information system.

Mission Critical - ANSWER-Any telecommunications or information system that is
defined as a national security system (Federal Information Security Management Act of
2002 - FISMA) or processes any information the loss, misuse, disclosure, or
unauthorized access to or modification of, would have a debilitating impact on the
mission of an agency.

Network Sniffing - ANSWER-A passive technique that monitors network communication,
decodes protocols, and examines headers and payloads for information of interest. It is
both a review technique and a target identification and analysis technique.

Non-repudiation - ANSWER-Assurance that the sender of information is provided with
proof of delivery and the recipient is provided with proof of the sender's identity, so
neither can later deny having processed the information.

Active Security Testing - ANSWER-Security testing that involves direct interaction with a
target, such as sending packets to a target.

Assurance Case - ANSWER-A structured set of arguments and a body of evidence
showing that an information system satisfies specific claims with respect to a given
quality attribute.

Authorization Boundary - ANSWER-All components of an information system to be
authorized for operation by an authorizing official and excludes separately authorized
systems, to which the information system is connected.

Clear - ANSWER-To use software or hardware products to overwrite storage space on
the media with nonsensitive data. This process may include overwriting not only the
logical storage location of a file(s) (e.g., file allocation table) but also may include all
addressable locations.

Common Control - ANSWER-A security control that is inherited by one or more
organizational information systems.

Escuela, estudio y materia

Institución
RISK MANAGEMENT FRAMEWORK OVERVIEW AND CONCE
Grado
RISK MANAGEMENT FRAMEWORK OVERVIEW AND CONCE

Información del documento

Subido en
26 de abril de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$22.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
NursingTutor1 West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1673
Miembro desde
3 año
Número de seguidores
1073
Documentos
18137
Última venta
1 semana hace
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

455 reseñas

5
215
4
78
3
91
2
21
1
50

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes