Chapters 4-6 Flashcards

(43 cards)

1
Q

What is Risk Management?

A

Identification, assessment and priotization of risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Two Formal Processes of Risk Management?

A
  • Risk Identification and Assessment
  • Risk Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are the Communities of Interest in Risk Management?

A
  • Information Security: leadership role in addressing risk
  • Information Technology: building and maintaining secure systems
  • Management: resource allocation and security prioritization
  • Users: crucial in early detection and proper response to threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Steps of Risk Management?

A
  • Evaluating Risk Controls
  • Determining Cost Effective Control Options
  • Acquiring and Installing Appropriate Controls
  • Overseeing Processes for Effectivity
  • Identfying Risks
  • Assessing Risks
  • Summarizing Findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Steps of Risk Identification?

A
  • Plan and Organize Process
  • Create System Component Categories
  • Develop Inventory of assets
  • Identify Threats
  • Specify Vulnerable Assets
  • Assign Value or Impact Rating to Assets
  • Assess Vulnerability Likelihood
  • Calculate Asset Relative Risk Factor
  • Preliminary Review of Possible Controls
  • Document Findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you Inventory Information Assets?

A
  • Identify Information Assets
  • Determine Which Attributes of Each Information Asset Should be Tracked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Asset Ranking?

A
  • Determine the Value of Assets
  • Prioritizing According to Value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Asset Classification Scheme?

A
  • Categorizes information assets based on sensitivity
  • Each category designates level of protection
  • Must be comprehensive and mutually exclusive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Relative Values?

A

Comparative judgements made to ensure the most valuable information assets are given the highest priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Threat Identification?

A

Assesses IT vulnerabilities and their capacity to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Vulnerability Assessment?

A

The process of defining, Identifying, classifying, and prioritizing vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Risk Assessment?

A

Create a method to evaluate the relative risk of each listed vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Extended Risk Formula?

A

Risk = Probability of Attack * Probability of Successful Attack * Value Lost on Successful Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Goals of the Risk Management Process?

A
  • Identify Information Assets and their Vulnerabilities
  • Rank them According to Sensitivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Goal of the Risk Identification Process?

A
  • Designate the Function of the Report
  • Define who is Responsible for Preparing and Reviewing the Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Risk Control?

A

Identifying Possible Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Three General Categories of Control?

A
  • Policies
  • Programs
  • Technical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the Four Basic Strategies of Control Risks?

A
  • Avoidance: applying safeguards against risks
  • Transference: shifting risk to other areas or outside entities
  • Mitigation: reducing impact of vulnerabilities
  • Acceptance: accepting risk without control or mitigation
19
Q

What are the Types of Mitigation Plans?

A
  • Disaster Recovery Plan (DRP)
  • Incident Response Plan (IRP)
  • Business Continuity Plan (BCP)
20
Q

What is a Metric?

A
  • A measurement of a periodic or ongoing activity
  • Used by management to measure key processes for their effectivities
21
Q

What are the 3 Metrics categorizations?

A
  • Key Risk Indicators (KRI): metrics associated with risk measurement
  • Key Goal Indicators (KGI): metrics that portray attainment of strategic goals
  • Key Performance Indicators (KPI): metrics that show the efficiency or effectivenes of security-related activities
22
Q

What is Security Control?

A

Measures that reduce risk by eliminating or preventing harm or discovering and reporting it

23
Q

What are the Types of Control Classifications?

A
  • Management Controls
  • Operational Controls
  • Technical Controls
24
Q

What are Management Controls?

A

Focuses on the selection of operational and technical controls to reduce risk of loss

25
What are Operational Controls?
Address control implementation and use of security policies and standards
26
What are Technical Controls?
Involve the correct use of hardware and software security capabilities in systems
27
What are the Types Control Classes?
- Supportive Controls - Preventative Controls - Detection and Recovery Controls
28
What are Supportive Controls?
Pervasive, underlying technical IT security capabilities that are interrelated and used by other controls
29
What are Preventative Controls?
Focuses on preventing security breaches by inhibiting security violation attempts
30
What are Detection and Recovery Controls?
Focuses on security breach responses by warning security violations or attempted violations
31
What is a Cost-Benefit Analysis?
- Identify controls that provide the greatest benefit given the available resources - Contrast the impact of implementing a control or not - A business decision
32
What is an IT Security Plan?
Detail the actions needed to improve the identified deficiencies in the risk profile
33
What details should be provided by the IT Security Plan?
- What will be done - What resources are needed - Who is responsible
34
What should be Included in the IT Security Plan?
- Risks, recommended controls, priorities - Selected controls, needed resources - Responsible personnel, implementation dates - Maintenance requirements
35
What are IT Security Plan Documents?
- What needs to be done for each selected control - Responsible personnel - Resources and time frame
36
What are Identified Personnel?
- Implement new or enhanced controls - May need system config changes, upgrades, or installs - May involve development of new or extended procedures - Need to be encouraged and monitored by management
37
How is security management a cyclic process?
constantly need to be repeated to respond to the changing IT systems and risk environment
38
What is included in Implementation followup?
- Maintenance of security controls - Security compliance checking - Change and configuration management - incident management
39
Why is Maintenance and Monitoring Important?
Ensure the continued correct functioning and appropriateness of implemented controls
40
What are the Tasks of Maintenance?
- Periodic review of controls - Upgrade controls to meet new requirements - System changes do not impact controls - Address new threats or vulnerabilities
41
What is Security Compliance?
- An audit process to review security process to ensure system complies with security plan - Checks if suitable policies and controls are maintained and used correctly
42
What is Change Management?
- Process in reviewing proposed changes - May be informal or informal - Test patches to ensure no adverse affects on other applications
43
What is Configuration Management?
- Keeps track of configurations of each system in use and the changes done to them - Know what patches or upgrades might be relevant - Lists of hardware and software versions to help with restoration following a failure