Chapter 2 Flashcards

(21 cards)

1
Q

Risk

A

Vulnerability x Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative risk analysis

A

Scenarios - 1 pagers
Delphi technique - anonymous feedback/response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative risk analysis

A

SLE (singe loss expectancy) = AV x EF (Exposure factor)
ALE = SLE x ARO (annual rate of occurence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk appetite - total across all assets; WILLING to shoulder
Risk capacity - total that CAN be shouldered
Risk tolerance - single threat-asset
Risk limit - max tolerable over target level

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk responses

A

Mitigation
Assign/Transfer
Deterrence
Avoidance
Acceptance
Reject/Ignore - NO NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Total risk - controls gap = residual risk

A

Controls gap is amount of risk reduced by implemented security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cost/benefit analysis:

ALE1 - ALE2 - ACS = value of safeguard

A

ACS - Annual Cost of Safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense in depth layers of control

A

Asset
Administrative controls
Logical/technical controls
Physical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control types

A

Preventive controls
Deterrent controls
Detective controls
Corrective controls
Compensating controls
Recovery controls
Directive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Maturity Model (RMM)

A

Ad-hoc
Preliminary - risk mgmt process but by diff departments
Defined - Standard organization-wide
Integrated - risk mgmt integrated with business processes; metrics
Optimized - Not reactive, but strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk mgmt framework

A

Identify
Analyze/Prioritize
Respond
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RMF (NIST)
- For gov’t

A

Prepare
Categorize - assets and risk
Select - controls
Implement
Assess - implemented and operating correctly
Authorize
Monitor - ongoing re-assessment, change mgmt, reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CSF (Cyber security framework)
[NIST]
- For critical infra and commercial orgs

A

Identify
Protect
Detect
Respond
Recover
Govern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

A

Authority
Intimidation
Urgency
Scarcity
Consensus
Familiarity
Trust
Prepending - prepend with APPROVED, AUTHORIZED, RE, FWD, etc.
Phishing
Spear phishing - targeted
Whaling - high value target phishing
Smishing - SMS phishing
Vishing - phishing over VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Typo squatting

A

take advantage of mistyping in URL’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gamification for security training

17
Q

Training and awareness effectiveness evaluation

A

Regular quizzes
Review event & incident logs for rate of occurrence

18
Q

Education

A

Comprehensive and more than what employee needs to know for the job

19
Q

Micro-training

A

Short, brief, focused learning modules or content

20
Q

AUP (Acceptable Use Policy)

A
  • What is and is not acceptable use and behavior
  • Designed to assign security roles and prescribe responsibilities for those roles
21
Q

Cybersecurity Insurance

A

Type of risk assignment / transfer

Key features:
1. Coverage of data breaches
2. Financial loss protection
3. Legal liabilities
4. Reputation mgmt
5. Business interruption
6. Ransomware protection
7. Forensic services
8. Incident response
9. Regulatory compliance cost
10. Third party liability