Ch-17 Flashcards

(10 cards)

1
Q

Enterprise Risk Management

A

enterprise risk management (ERM) program - organizations take a formal approach to risk analysis that begins with identifying risks, continues with determining the severity of each risk, and then results in adopting one or more risk management strategies to address each risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Important Terms

A

Threats - any possible events that might have an adverse impact on the confidentiality, integrity, and/or availability of our information or information systems.

Vulnerabilities - weaknesses that could be exploited by a threat.

Risk - occur at the intersection of a vulnerability and a threat that might exploit that vulnerability. A threat without a corresponding vulnerability does not pose a risk, nor does a vulnerability without a corresponding threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Identification

A

risk identification - process requires identifying the threats and vulnerabilities that exist in your operating environment.

External - originate from a source outside the organization

Internal - originate from within the organization

Multiparty - those that impact more than one organization. For example, a power outage to a city block

Legacy Systems - outdated systems often do not receive security updates and cybersecurity professionals must take extraordinary measures to protect them against unpatchable vulnerabilities.

Intellectual Property - company possesses trade secrets or other proprietary information which, if disclosed, could compromise the organization’s business advantage.

Software Compliance/Licensing - organization licenses software from a vendor and intentionally or accidentally runs afoul of usage limitations that expose the customer to financial and legal risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Calculation

A

Risk Severity = Likelihood * Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Assessment Methodologies

A

Quantitative risk assessments - use numeric data in the analysis, resulting in assessments that allow the very straightforward prioritization of risks.

Qualitative risk assessments - substitute subjective judgments and categories for strict numerical analysis, allowing the assessment of risks that are difficult to quantify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Impact

A
Business Impact Analysis (BIA) - a formal process designed to identify the mission essential functions within an organization and facilitate the identification of the critical systems that support those functions. Four Key Parts-
MTBF - Mean Time Between Failures
MTTR - Mean Time To Repair
RTO - Recovery Time Objective
RPO - Recovery Point Objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disaster Recovery Plan

A

disaster recovery planning process creates a formal, broad disaster recovery plan for the organization and, when required, develops specific functional recovery plans for critical business functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classifications

A

Sec+ Labels -
Public, Private, Sensitive, Confidential, Critical, Proprietary

Military Labels -
Most to least - top secret, secret, confidential, unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Roles

A

Data controllers - are the entities who determine the reasons for processing personal information and direct the methods of processing that data.

Data stewards - are individuals who carry out the intent of the data controller and are delegated responsibility from the controller.

Data custodians - are individuals or teams who do not have controller or stewardship responsibility but are responsible for the secure safekeeping of information.

Data processors are service providers that process personal information on behalf of a data controller.

Data Protection Officers - Organizations should identify a specific individual who bears overall responsibility for carrying out the organization’s data privacy efforts. This person, often given the title of chief privacy officer, bears the ultimate responsibility for data privacy and must coordinate across functional teams to achieve the organization’s privacy objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Privacy Technology

A

de-identification/data obfuscation - process removes the ability to link data back to an individual, reducing its sensitivity.

Hashing - uses a hash function to transform a value in our dataset to a corresponding hash value. Data becomes non-convertible.

Tokenization - replaces sensitive values with a unique identifier using a lookup table. Data is convertible.

Data masking - partially redacts sensitive information by replacing some or all of sensitive fields with blank characters. For example, we might replace all but the last four digits of a credit card number with X’s or *’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly