Chapter 1 Measuring and Weighing Risk Flashcards

1
Q

SLExARO=ALE

A

Single Loss Expectancy (how much one loss costs)

x

Annual Rate of Occurence (how likely it is to happen)

=

Annual Loss Expectancy (how much you will lose)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative vs. Quantitative Risk Assessment

A

Qualitative

  • Opinion based and subjective
  • may be valued by the business, bot not necessarily by customers

Quantitative

  • Cost-based and subjective
  • May impede money making ability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Likelihood (risk)

A

A score representing the possibility of an event occurring

Can be expressed in qualitative or quantitative terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Vectors (risk)

A

The way in which an attacker poses a threat

  • May be a tool an attacker would use, the path they may follow, et cetera
  • Anything from a fake email to an unsecured hotspot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTBF (failure risk)

A

Mean Time Between Failure

-The life expecancy of a system or part that can be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MTTF (failure risk)

A

Mean Time To Failure

-Average time to failure of an object that must be replaced, not repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTTR (failure risk)

A

Mean Time To Restore/Repair

-How long it will take to repair or restore a piece of equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RTO (failure risk)

A

Recovery Time Objective

-maximum time a process or service is allowed to be down and the consequences further down time may bring to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RPO (failure risk)

A

The time allowed between recovery point and failure

-Less time is more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Avoidance

A

Identify the risk, no longer engage in the actions that cause the risk

-Suzie downloaded a virus from a weird FTP server? All right, FTP ports are now blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Transference

A

Share the burden of risk with someone else, like an insurance company or a cloud storage service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Mitigation

A

Taking steps to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLP

A

Data Loss Prevention

-monitors systems to make sure key info isn’t missing. See who’s using and transmitting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Deference

A

Threaten potential enemies to keep them from wanting to initiate an attack on the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Acceptance

A

Sometimes the cost of implementing a system outweighs the cost of an attack, or sometimes you simply don’t have the budget to worry about certain attacks.

-These risks MUST be identified and quantified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three Different Cloud Deployment Types

A

PaaS-Platform as a Service

-Vendors allow apps to be created and run on their infrastructure

SaaS-Software as a Service

-Applications are run remotely over the web

Iaas-Infrastructure as a service

-Virtualization that’s paid for

17
Q

Risks of Cloud Computing

A

Regulatory Compliance

-You may have to comply with regulations set by, say SOX. It can be hard to prove that you’re complying with a cloud-based system.

User Privileges

  • you don’t have the same level of control and administration
  • Recovering from issues may be limited to Service provider tech staff availability

Data Integration/Segregation

-Data may be too close to other companies’. Keep your data encrypted and set parameters.

18
Q

Risks of Virtualization

A

Breaking out of the VM

-A skilled hacker may be able to break out of their virtual machine and wreak havoc system-wide

Network Security Controls can intermingle

  • The tools to administer a VM may not be as robust
  • If the hypervisor can be attacked, the whole system is compromised
19
Q

Policies

A

Provides employees with guidance about expected behavior Scope Statement

  • What the policy intends to accomplish, and which documents, laws, and practices the policy addresses
  • What the policy is about and how it applies to the users

Policy Overview Statement

-Goal of the policy, why it’s important, how to comply -roughly a paragraph long

Accountability Statement

  • Address who (position) is responsible for ensuring the policy is enforced
  • Give the user contact info for problem reports
  • Consequences for poor compliance

Exception Statement

  • Guidance for the procedure/process of deviation from the policy
  • May include an escalation contact
20
Q

Standards

A

Deals with specific issues and aspects of a business

Should provide enough detail that an audit may be performed

Scope and Purpose

-Explain intention. May include software, addons, etc.

Roles and Responsibilites

-Who’s responsible for implementing, monitoring, and maintaining?

Reference Documents

-Explains standards to clear up confusion or uncertainty

Performance Criteria

-Baselines and technology standards

Maintenance and Administrative Requirements

-What do you need to manage and administer the systems?

21
Q

Guidelines

A

Less formal policies or standards Give you step-by-step instructions for accomplishing certain tasks

Scope and Purpose

-Why it exists, to whom it applies

Roles and Responsibilities

-Which departments are assigned which tasks

Guideline Statements

-General steps on how to do shit

Operational Considerations -What needs to happen and when

22
Q

Separation of Duties

A

Make sure not just one person is running the show

Cuts down on chances of embezzlement and makes sure you’re not dependent on one person to do a job

23
Q

Privacy Policies

A

Essentially the privacy rights users have in general when making use of the company’s equipment

24
Q

AUPs

A

Acceptable Use Policies

-What users are allowed to do and the consequences for not following the AUP

25
Security Policies
What controls are required to implement and maintain security systems
26
Job Rotation
Defines the intervals at which employees must rotate jobs Same benefits of Separation of Duties
27
Succession Planning
Which employees are able to fill certain positions should the positions vacate
28
Error Types (false positives/negatives
**Type I** -False positive. There wasn't really a problem **Type II** -False negative. A problem wasn't properly reported **Type III** -You came to the right conclusion, but for the wrong reasons
29
BIA
**B**usiness **I**mpact **A**nalysis **I**dentify critical functions -What is absolutely necessary to function? **P**rioritize critical business functions -What services do you need to restore **first**? **C**alculating time frame for critical system loss -How long can you survive without a given system? **E**stimating tangible/intangible impact on the organization - Tangible: lost production or sales - Intangible: will customers lose faith in the company?
30
Redundancy
Systems are... **D**uplicated -Mirroring of systems in case of whole system failure **C**lustered -Many systems working together to accomplish a certain task **S**et up for failover -If a system fails, another system will pick up where it left off \*This can be very expensive
31
Fault Tolerance
The ability of a system to sustain operations in the event of component failure -Have spare parts and backup electrical power at the ready
32
RAID
**RAID 0**-Disk striping -Data is written across disks simultaneously for insane speed and complete lack of fault tolerance **RAID 1**-Mirroring -Data is cloned on disks to provide for slow speeds and 100% fault tolerance **RAID 3**-Striping with Parity Disk - A parity disk keeps information so if a disk in the RAID array goes out, a new one can be plugged in and the data can be restored - If the parity disk fails, the whole system fails **RAID 5**-Striping with Parity - Parity information is written across all disks - If you lose any drive, you can plug in a new one and the data can be restored - 3-32 disks allowed