Chapter 2 (Domain 1) Flashcards

Personnel Security and Risk Management Concepts

1
Q

IAM

A

Identity and Access Management

System of an organization which will provision the account and assign necessary privileges and access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AUP

A

Acceptable Use Policy
Policy that users must understand and sign to adhere to the necessary policies related to their perspective job position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

Anything used in a business process or task. Person, place, or thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset Valuation

A

Value assigned to an asset based on a number of factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats

A

Any potential occurrence that may cause and undesirable or unwanted outcome for an organization or for a specific asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Agent/Actors

A

Intentionally exploit vulnerabilities. Usually people but can be programs, hardware, or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Events

A

Accidental occurrence or intentional exploitations of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Vector

A

AKA Attack Vector. The path or means by which an attack or attacker can gain access to a target in order to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

The weakness in an asset or the absence or the weakness of a safeguard or countermeasure is a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Exposure

A

Being susceptible to asset loss because of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk

A

The possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result.
Risk = Threat * Vulnerability
Risk = Probability of harm * Severity of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Safeguards

A

Security control, protection mechanism, or countermeasure that removes/reduces the vulnerability or protects against one or more specific threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack

A

An attack is the intentional attempted exploitation of a vulnerability by a threat agent to cause damage, loss, or disclosure of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Breach

A

Breach, intrusion, or penetration is the occurrence of a security mechanism being bypassed or thwarted by a threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Delphi Technique

A

An anonymous feedback-and-response process used to enable a group to reach an anonymous consensus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Single-loss Expectancy (SLE)

A

SLE = Asset Value (AV) * Exposure Factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Annual Loss Expectancy (ALE)

A
ALE = ARO * SLE
ALE = ARO * AV * EF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Mitigation

A

The implementation of safeguards, security controls, and countermeasures to reduce and/or eliminate vulnerabilities or block threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk Assignment

A

Assignment/Transferring is the placement of the responsibility of loss due to a risk onto another entity or organization. ie… insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk Deterrence

A

Process of implementing deterrents to would-be violators of security and policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Risk Avoidance

A

Is the process of selecting alternate options or activities that have less associated risk than the default, common, expedient, or cheap option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk Acceptance

A

The result after a cost/benefit analysis shows countermeasure costs would outweigh the possible cost of loss due wot a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Risk Rejection

A

Ignoring the risk.

24
Q

Inherent risk

A

The level of natural, native , or default risk that exists in an environment, system, or product prior to any risk management efforts being performed.

25
Q

Residual Risk

A

Consists of threats to specific assets against which upper management chooses not to implement a response.
Total risk - Control Gap = Residual risk

26
Q

Control Gap

A

Difference between residual risk and total risk

27
Q

Total Risk

A

Amount of risk an organization would face if no safeguards were in place.
Total Risk = asset value * vulnerabilities * threats

28
Q

Annual Cost of Safeguards (ACS)

A

Cost each year to implement safeguards

29
Q

Cost/Benefit Analysis

A

Calculation used to determine whether the safeguard actually improves security without costing too much.
[ALE pre-safeguard - ALE post-safeguard] - annual cost of safeguard (ACS) = value of the safeguard to the company

30
Q

Three categories of security controls

A

Administrative
Logical/Technical
Physical

31
Q

Administrative Controls

A

The policies and procedures defined by an organization’s security policy and other regulations or requirements.

32
Q

Logical/Technical Controls

A

Involves the hardware or software mechanisms used to manage access and provide protection for the IT resources and systems.

33
Q

Physical Controls

A

Security mechanisms focused on providing protections to the facility and real-world objects.

34
Q

Preventative Control

A

Deployed to thwart or stop unwanted or unauthorized activity from occurring.

35
Q

Deterrent Control

A

Deployed to discourage security Policy violations.

36
Q

Detective Control

A

Deployed to discover or detect unwanted or unauthorized activity.

37
Q

Compensating Control

A

Deployed to provide various options to other existing controls to aid in enforcement and support of security policies.

38
Q

Corrective Control

A

Modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred.

39
Q

Recovery Control

A

An extension of corrective controls but have more advanced or complex abilities.

40
Q

Directive Control

A

Deployed to direct, confine, or control the actions of subjects to force or encourage compliance with security policies.

41
Q

Security Control Assessment (SCA)

A

Formal evaluation of a security infrastructure’s individual mechanisms against a baseline or reliability expectations.

42
Q

Risk Reporting

A

A key task to perform at the conclusion of a risk analysis. Risk reporting involves the production of a risk report and a presentation of that report to the interested/relevant parties.

43
Q

Risk Register

A

Risk log. Document that inventories all the identified risks to an organization or system or within an individual project.
Tracked activities:
-Identifying risks
-Evaluating the severity of and prioritizing those risks
-Prescribing responses to reduce or eliminate the risks
-Tracking the progress of risk mitigation

44
Q

Risk Matrix

A

Risk Heat Map. Form of risk assessment that is performed on a basic graph or chart.

  • Qualitative
  • 3x3 grid
45
Q

Risk Maturity Model (RMM)

5 Levels

A

Assess the key indicators and activities of a mature, sustainable, and repeatable risk management process.

1) Ad hoc- Chaotic starting point from which risk management is initiated
2) Preliminary - Loose attempts are made to follow risk management process
3) Defined - A common or standardized risk framework is adopted organization wide.
4) Integrated - Risk Management operations are integrated into business processes.
5) Optimized - Risk management focus on achieving objectives

46
Q

Prepending

A

The adding of a term, expression, or phrase to the beginning or header of some other communication. Ex… RE:, FW:, EXTERNAL, PRIVATE, INTERNAL

47
Q

Smishing

A

Short Message Service (SMS) phishing. Phishing over text messages.

48
Q

Vishing/SpIt

A

Phishing done over any telephony or voice communication system.

49
Q

Tailgating

A

When an unauthorized entity gains access to a facility under the authorization of a valid worker but WITHOUT their knowledge.

50
Q

Piggybacking

A

When an unauthorized entity gains access to a facility under the authorization of a valid worker by tricking the victim into providing consent.

51
Q

First step in defining security needs related to personnel and being able to seek out new job hires?

A

Job description

52
Q

Onboarding

A

Process of adding new employees to the organization using socialization and orientation.

53
Q

Offboarding

A

The removal of an employee’s identity from the IAM system once that person has left the organization.

54
Q

Nondisclosure Agreement (NDA)

A

Used to protect the confidential information within an organization from being disclosed by a former employee.

55
Q

User Behavior Analytics (UBA) and User and Entity Behavior Analytics (UEBA)

A

Concept of analyzing the behavior of users, subjects, visitors, customers, etc for some specific goal or purpose.

56
Q

What is a security champion?

A

A member of a group who decides to take charge of leading the adoption and integration of security concepts into the group’s work activities. Not a security team member.

57
Q

What is gamification?

A

A means to encourage compliance and engagment by integrating common elements of game play into other activities, such as security compliance and behavioral change.