IS Governance & Risk Mgmt Flashcards

1
Q

Annual Rate of Occurrence (ARO)

A

The number of times per year that an incident is likely to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Any person, facility, material, information, or activity that has a positive value to an owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack

A

Attempt to gain unauthorized access to an information system’s services, resources, or information, or the attempt to compromise an information system’s integrity, availability, or confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Continuity Plan (BCP)

A

A documented and tested plan for responding to an emergency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT

A

Control Objectives for Information and Related Technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control

A

Any protective action, device, procedure, technique, or other measure that reduces exposures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Countermeasures

A

The deployment of a set of security services to protect against a security threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Due care

A

Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due diligence

A

The enforcement of due care policy and provisions to ensure that the due care steps taken to protect assets are working effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Exposure Factor (EF)

A

A measure of the magnitude of loss or influence on the value of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information Security Management Systems (ISMS)

A

The International Standards Organization (ISO) defines ISMS to be that part of an overall management system based on a business risk approach to establish, implement, operate, monitor, maintain, and improve information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood

A

The qualitative or quantitative likelihood that a potential hazard will occur or a potential threat will be instantiated. Most international standards define six levels of likelihood (lowest to highest): incredible, improbable, remote, occasional, probable, and frequent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

(1) The probability that a particular security threat will exploit a particular vulnerability resulting in loss or harm to an asset or precluding the organization from reaching a goal or objective.
(2) A combination of the probability of an event and its consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Management

A

Coordinated activities to direct and control an organization with regard to risk; The discipline of identifying and measuring security risks associated with an information system, and controlling and reducing those risks to an acceptable level. The goal of risk management is to invest organizational resources to mitigate security risks in a cost-effective manner, while enabling timely and effective mission accomplishment. Risk management is an important aspect of information assurance and defense-in-depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Safeguard

A

Protection included to counteract a known or expected condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

Any entity or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, or denial of service.

17
Q

Threat-source

A

Either (a) intent and method targeted at the international exploitation of a vulnerability, or (b) a situation and method that may accidentally trigger a vulnerability. Synonymous with threat agent.

18
Q

Total risk

A

The potential for the occurence of an adverse event if no mitigating action is taken (ie. the potential for any applicable threat to exploit a system vulnerability). See also acceptable risk, residual risk, minimum level of protection.

19
Q

Vulnerability

A

A weakness in a system that can be exploited to violate the system’s intended behavior relative to safety, security, reliability, availability, integrity, etc.