Chapter 1 Risk Management Flashcards
(70 cards)
The likelihood of a threat actor taking
advantage of a vulnerability by using a threat against
an IT asset
Risk
Anyone or anything with the motive
and resources to attack another’s IT infrastructure
Threat Actor
A weakness in an asset
Vulnerability
An action that a threat actor can use
against a vulnerability to cause harm
Threat
Pathways to gain access to infrastructure
Attack Vectors
occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.
Supply-chain attack
- Government reports
- Media
- Academic papers
OSINT (open-source intelligence)
- Tor network, Tor Web browser
- Encrypted anonymous connections
- Not indexed by search engines
- Tor encryption and anonymity
Journalists
Law enforcement
Government informants
Dark Web/dark net
Exchange of cybersecurity intelligence (CI) between
entities
Automated Indicator Sharing (AIS)
- A form of AIS
- Data exchange format for cybersecurity intelligence
Structured Threat Information eXpression (STIX)
- Like RSS feed for threats
- Consists of TAXII servers and clients
- Real-time cyber intelligence feeds
Trusted Automated eXchange of Intelligence
Information (TAXII)
- Financial statement integrity
- Internal controls
- Type I and Type II
Statement on Standards for Attestation Engagements
System and Organization Controls (SSAE SOC 2)
- “Guide for Conducting Risk Assessments“
NIST Special Publication (SP) 800-30, Rev. 1
Protects EU citizens’ private data
General Data Protection Regulation (GDPR)
Protect American patient medical information
Health Insurance Portability and Accountability Act
(HIPAA)
Protect cardholder information
Payment Card Industry Data Security Standard (PCI
DSS)
a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.
- Cloud Controls Matrix (CCM)
Cloud Security Alliance (CSA)
Specifies which users are allowed or denied access to a set of protected resources
Resource access policies
Defines why and how you store data, for how long, and then how you dispose of it.
Data retention policies
- Risk awareness
- Cybersecurity intelligence sources
- Evaluate security controls
- Inherent (current) and residual risk
- Implement security controls
- Periodic review
Risk Assessment Process
- Environmental
- Flood, hurricane
- Person-made
- Riots, terrorism, sabotage
- Internal
- Malicious insider, malware infections
- External
- Distributed denial of service (DDoS)
Risk Types
- Mitigation/reduction
- Transference/sharing
- Avoidance
- Acceptance
Risk Treatments
Security controls are proactively put in place before
undertaking the risk
Mitigation/reduction
- Some risk is transferred to a third party in exchange for
payment - Example: cybersecurity insurance
Transference/sharing