Chapter 2 - Governance and Risk Flashcards
(133 cards)
Availability?
Uptime and timeliness
What is AIC or CIA?
Availability Integrity Confidentiality
Used to define security platform and threat surfaces
Integrity?
Unaltered information accuracy
Confidentiality?
Authorized disclosure
Shoulder surfing
Looking over the shoulder to view screen data or passwords
Social engineering
Tricking someone into divulging information
Vulnerability?
Lack of or weakness in a countermeasure that is exploitable
Threat?
The potential danger if a vulnerability is exploited
Threat Agent?
The entity that takes action on the threat and vulnerability
Risk?
The likelihood a threat agent will exploit a vulnerability and the impact that could cause to the business
Exposure?
This is the damage caused by a successful attack
Control?
Countermeasure to reduce risk a vulnerability may cause
Also known as safeguard
Deterrent control?
Discourage attacker
What three categories make for defense in depth ?
Administrative
Technical
Physical controls
Preventive control?
Avoid an incident entirely
Corrective control?
Fixes after an incident
Recovery control?
Intended to bring the environment back
Detective control?
Detect what occurred and who did it
Compensating control?
Alternative controls (a proxy server instead of a port block)
What three controls commonly make up a security policy?
Preventative, detective, and recovery
Why is security by obscurity a bad thing?
It assumes you are smarter than the attacker and in most cases lowers productivity
What cycle does the ISO standards follow?
Plan-Do-Check-Act (PDCA)
What is the BS7799? What did it become?
BS7799 was a British security defacto standard that was adopted by ISO 27000 it also goes by the name ISO 17799
What is the difference between framework and architecture?
Framework is an outline blueprint and architecture is the blueprint that fits the specific need