Chapter 1 Risk Management Flashcards

(70 cards)

1
Q

The likelihood of a threat actor taking
advantage of a vulnerability by using a threat against
an IT asset

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anyone or anything with the motive
and resources to attack another’s IT infrastructure

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A weakness in an asset

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An action that a threat actor can use
against a vulnerability to cause harm

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pathways to gain access to infrastructure

A

Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.

A

Supply-chain attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Government reports
  • Media
  • Academic papers
A

OSINT (open-source intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Tor network, Tor Web browser
  • Encrypted anonymous connections
  • Not indexed by search engines
  • Tor encryption and anonymity
     Journalists
     Law enforcement
     Government informants
A

Dark Web/dark net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exchange of cybersecurity intelligence (CI) between
entities

A

Automated Indicator Sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • A form of AIS
  • Data exchange format for cybersecurity intelligence
A

Structured Threat Information eXpression (STIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Like RSS feed for threats
  • Consists of TAXII servers and clients
  • Real-time cyber intelligence feeds
A

Trusted Automated eXchange of Intelligence
Information (TAXII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Financial statement integrity
  • Internal controls
  • Type I and Type II
A

Statement on Standards for Attestation Engagements
System and Organization Controls (SSAE SOC 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • “Guide for Conducting Risk Assessments“
A

NIST Special Publication (SP) 800-30, Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protects EU citizens’ private data

A

General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protect American patient medical information

A

Health Insurance Portability and Accountability Act
(HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protect cardholder information

A

Payment Card Industry Data Security Standard (PCI
DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

    • Cloud Controls Matrix (CCM)
A

Cloud Security Alliance (CSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Specifies which users are allowed or denied access to a set of protected resources

A

Resource access policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Defines why and how you store data, for how long, and then how you dispose of it.

A

Data retention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Risk awareness
  • Cybersecurity intelligence sources
  • Evaluate security controls
  • Inherent (current) and residual risk
  • Implement security controls
  • Periodic review
A

Risk Assessment Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Environmental
  • Flood, hurricane
  • Person-made
  • Riots, terrorism, sabotage
  • Internal
  • Malicious insider, malware infections
  • External
  • Distributed denial of service (DDoS)
A

Risk Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • Mitigation/reduction
  • Transference/sharing
  • Avoidance
  • Acceptance
A

Risk Treatments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security controls are proactively put in place before
undertaking the risk

A

Mitigation/reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • Some risk is transferred to a third party in exchange for
    payment
  • Example: cybersecurity insurance
A

Transference/sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Avoid an activity because the risks outweigh potential gains
Avoidance
26
- The current level of risk is acceptable - The risk falls within the organization's risk appetite
Acceptance
27
Strives to determine the likelihood and impact of threats
risk assessment
28
* Based on numeric values * Asset value (AV) * Exposure factor (EF) - Percentage of asset value loss when negative incident occurs
Quantitative Risk Assessment
29
- Percentage of asset value loss when negative incident occurs
Exposure factor (EF)
30
* How much loss is experienced during one negative incident? SLE = AV (Asset Value)x EF(Exposure Factor)
Single Loss Expectancy (SLE)
31
Number of incidents per year.
Annualized rate of occurrence (ARO)
32
- Total yearly cost of bad things happening ALE = SLE(single Loos Expectancy) X ARO(Annual Rate of Occurrence)
Annualized loss expectancy (ALE)
33
Based on subjective opinions regarding: - Threat likelihood - Impact of realized threat * Threats are given a severity rating
Qualitative Risk Assessment
34
* Centralized list of risks, severities, responsibilities, and mitigations * Generally considered qualitative - Example: severity or impact ratings - Occasionally includes hard numbers (%, $)
Risk Register
35
* Table of risk details * Similar to a heat map but without colors
Risk Matrix
36
* Prioritize mission-critical processes * Assess risk
Business Impact Analysis (BIA)
37
- Payment processing systems - Customer/patient records
Prioritize mission-critical processes
38
- Identify sensitive data - Identify single points of failure - Identify security controls and compliance
Assess risk
39
- Average time between repairable component failures - Software patching
Mean time between failures (MTBF)
40
- Average time between NON-repairable component failures - Hard disks, switches, routers
Mean time to failure (MTTF)
41
Time required to repair a failed component
Mean time to repair (MTTR)
42
- Maximum tolerable amount of data loss - Directly related to backup frequency
Recovery point objective (RPO)
43
- Maximum tolerable amount of downtime - Return systems and data to usable state
Recovery time objective (RTO)
44
- Top secret - Secret - Confidential
Government/military classification
45
- PII (personally identifiable information) - PHI (protected health information) - Proprietary - Public/private - Critical - Financial
Standard classification
46
* Ensure data privacy and breach notification * Levy fines * Protect intellectual property (IP)
Data Privacy Standards
47
* Any method of applying metadata - Example: cloud resource tagging
Data Classification Tools
48
- Legal data owner - Set policies on how data will be managed
Owner
49
Ensure data complies with applicable regulations
Controller
50
Handles data in accordance with privacy guidelines
Processor
51
Responsible for managing data (permissions, backup) in alignment with data owner policies
Custodian/steward
52
Ensures data privacy regulation compliance such as with GDPR
Data privacy officer (DPO)
53
Ensures data privacy regulation compliance such as with GDPR
Data privacy officer (DPO)
54
* Collect * Store * Process * Share * Archive/delete
Information Life Cycle
55
One or more pieces of sensitive information that can be traced back to an individual
Personally Identifiable Information (PII)
56
One or more pieces of sensitive medical information that can be traced back to an individual
Protected Health Information (PHI)
57
* Pseudo-anonymization * Data minimization * Tokenization * Data masking
Anonymization Techniques
58
Replace PII with fake identifiers
Pseudo-anonymization
59
Limit stored/retained sensitive data
Data minimization
60
A digital token authorizes access instead of the original credentials
Tokenization
61
- Hide sensitive data from unauthorized users - Masked out credit card number digits on a receipt
Data masking
62
Location of data and laws that apply to it - Where did the data originate? - Where does the data reside? - Which laws/regulations apply to the data?
Data Sovereignty
63
* Standard operating procedure (SOP) * Mandatory vacation, job rotation * Separation of duties (multi-person control)
Personnel Management Policies
64
- Reduce intentional/ unintentional sensitive data exfiltration
Data Loss Prevention (DLP) systems
65
- Legal review, regulatory compliance - Linking companies, partners, agencies - Vulnerability scan results - Mandatory training/ certification - Input from IT security professionals
Interconnection security agreement (ISA)
66
- Contractual document stating level of service - Guarantee service uptime - Consequences for not meeting requirements
Service level agreement (SLA)
67
Broad terms of agreement between parties
Memorandum of understanding (MOU)
68
Detailed terms between parties
Memorandum of agreement (MOA)
69
- Legal document - Responsibilities, investment, decision-making
Business partnership agreement (BPA)
70
Prevent sensitive data disclosure to third parties
Non-disclosure agreement (NDA)