Chapter 1 Flashcards

(50 cards)

1
Q

Risk Assessment

A

Deals with threats, vulnerabilities, and impacts of a loss of information processing capability or a loss of information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key components of the risk assessment process

A

Risks to which the organization is exposed
Risks that need addressing
Coordination with BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risks to which the organization is exposed

A

Develop scenarios that can help deal with risks as they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks that need addressing

A

Deciding which risks are likely and unlikely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Coordination with BIA

A

Business impact analysis provides an accurate picture of the threats facing the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annual Loss Expectancy - expected monetary loss per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SLE

A

Single Loss Expectancy - monetary amount lost at one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two components of SLE

A

AV - Asset Value

EF - Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO

A

Annual Risk of Occurence - Likelihood of an event occuring within a year. Often drawn from historical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the formula used for Risk Assessment?

A

SLE * ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Vector

A

Method used by attacker to compromise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MTBF

A

Mean Time Between Failures - Anticipated lifetime of a component. Used for items that can be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MTTF

A

Mean time to failure - Used for components that cannot be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MTTR

A

Mean time to restore (or repair) - average downtime for a component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RTO

A

Recovery Time Objective - the maximum acceptable amount of time that a component can be down.
Beyond this time, outage negatively affects business.
Agreed upon in BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RPO

A

Recovery Point Objective - What point (time or version) of the system will be recovered? The more recent the more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Five approaches to identified risks

A
Risk Avoidance
Risk Transference
Risk Mitigation
Risk Deterrence
Risk Acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk Avoidance

A

Not engaging in the risky activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk Transference

A

Insurance policy (sharing risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Risk Mitigation

A

Taking measures to decrease the likelihood of an adverse event (antivirus programs)

22
Q

Risk deterrence

A

Posting warnings, setting up and publicizing negative consequences for the attacker

23
Q

CompTIA Risk Mitigation specifics

A

Audits of user rights and permissions
change management
incident management
DLP systems

24
Q

DLP system

A

Data Loss Prevention

25
Platform as a service
vendors allow apps to be created and run on their infrastructure
26
Software as a service
Applications run over the web
27
Infrastructure as a service
Virtualization
28
Risks of cloud computing
Regulatory Compliance User Privileges Data Integration/Separation
29
Hypervisor
Software that hosts the virtual machines
30
Risks associated with Virtualization
Breaking out of the VM | Network and Security Controls intermingle
31
A good policy has a ______ that outlines what the policy intends to accomplish
Scope Statement (sentence)
32
Policy Overview Statement
Provides the goal of the policy, why it is important and how to comply with it. (paragraph, checklist, bulleted list)
33
Accountability Statement
Addresses who is responsible (by their position) for enforcement
34
Exception Statement in a policy
Addresses how to deviate from the policy, e.g. who to contact for authorization
35
Standard
Derived from policies, more specific than policies
36
Scope and purpose of a standards document
Describes the intention of the standards document
37
Key points of a standards document
``` Scope and Purpose Roles and Responsibilities Reference Documents Performance Criteria Maintenance and Administrative Requirements ```
38
Roles and Responsibilities (Standards Document)
Who is responsible for implementing, monitoring and maintaining the standard
39
Reference Documents (standards Doc)
Explains how the standard relates to different policies
40
Performance Criteria (standards document)
Outlines how to accomplish the task
41
Maintenance and Administrative Reqs (standards document)
manage and administer systems and networks. Example: how often to change passwords
42
Guidelines
Less formal than Policies or Standards, helps to follow policies and standards
43
Guideline Document sections
Scope and Purpose Roles and Responsibilities Guideline Statements Operational Considerations
44
Scope of a guideline or standard
Which employees it applies to
45
Guideline statements
step by step instructions
46
Operational Considerations (guidelines document)
what duties are required and at what intervals e.g. backups
47
Acceptable Use Policies
How employees can use systems and resources, with consequences for misuse
48
pod slurping
getting files from a network through USB or cloud drives
49
Type I error
False Positive - False Alarm (positive is preferable)
50
Type II error
False Negative - missed a threat