Slayer CPA
SectionsBlogLog In
Information Systems and Controls/Blueprint/2.A

Security frameworks and standards

Area 2: Security, Confidentiality, and Privacy (35-45%)

Your Progress

0 of 95 questions attempted

Topics

  • NIST Cybersecurity Framework
  • ISO 27001 and security program elements
  • COSO and security integration

Lessons

  • Security and Control Frameworks

Study Frameworks

NIST Cybersecurity Framework (CSF)

NIST CSF Core Functions
Identify
Asset management — inventory all hardware, software, data
Risk assessment — identify threats and vulnerabilities
Governance — policies, procedures, regulatory requirements
Protect
Access control — authentication and authorization
Data security — encryption, DLP, classification
Training — security awareness programs
Detect
Continuous monitoring — SIEM, IDS/IPS, log analysis
Anomaly detection — behavioral analytics, baselines
Detection processes — defined and tested procedures
Respond
Response planning — predefined incident response plans
Communications — internal and external notification
Mitigation — contain and limit the impact
Recover
Recovery planning — restore systems and data
Improvements — lessons learned, update procedures
Communications — coordinate restoration with stakeholders

Annualized Loss Expectancy (ALE)

ALE = SLE x ARO

Single Loss Expectancy (SLE = asset value x exposure factor) times Annualized Rate of Occurrence (ARO). Used to justify security spending: implement control if cost < ALE reduction.

Single Loss Expectancy (SLE)

SLE = Asset Value x Exposure Factor (EF)

Expected monetary loss each time a risk event occurs. Exposure factor is the percentage of asset value lost (0 to 1).

Risk Calculation

Risk = Threat x Vulnerability x Impact

Qualitative or quantitative risk assessment. Threat is the probability of an attack, vulnerability is the likelihood of exploitation, impact is the resulting damage.

NIST CSF Functions and Categories

FunctionKey CategoriesPurpose
IdentifyAsset Management, Risk Assessment, GovernanceUnderstand the organizational context and risk landscape
ProtectAccess Control, Data Security, Training, MaintenanceImplement safeguards to ensure service delivery
DetectAnomalies & Events, Continuous Monitoring, Detection ProcessesIdentify cybersecurity events in a timely manner
RespondResponse Planning, Communications, Mitigation, AnalysisTake action on detected cybersecurity events
RecoverRecovery Planning, Improvements, CommunicationsRestore capabilities impaired by cybersecurity events
IPDRRIdentify, Protect, Detect, Respond, Recover

The five core functions of the NIST Cybersecurity Framework, in order. Remember: 'I Protect, Detect, Respond, Recover.'

CIAConfidentiality, Integrity, Availability

The three pillars of information security. Confidentiality = prevent unauthorized disclosure. Integrity = prevent unauthorized modification. Availability = ensure authorized access when needed.

Practice These Topics(95 questions)