D1 - Security and Risk Management Flashcards

1
Q

Any single input to a process that, if missing, would cause the process or several processes to be unable to function.

A

Single Points of Failure (SPOF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any word, name, symbol, color, sound, product shape, device, or combination of these that is used to identify goods and distinguish them from those made or sold by others.

A

Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the buisness.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Determines the potential impact of disruptive events on the organization’s business processes.

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defined as the difference between the original value and the remaining value of an asset after a single exploit.

A

Single Loss Expectancy (SLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A systematic process for identifying, analysing, evaluating, remedying, and monitoring risk.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The practice of passing on the risk in question to another entity, such as an insurance company.

A

Risk Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The practice of the elimination of or the significant decrease in the level of risk presented.

A

Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of coming up with alternatives so that the risk in question is not realised.

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of accepting certain risk(s), typically based on a business decision that may also weigh the cost versus benefit of dealing with the risk in another way.

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A combination of the probability of an event and its consequence. (ISO 27000)

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The point in time to which data must be restored in order to successfully resume processing.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How quickly you need to have that application’s information available after downtime has occurred.

A

Recovery Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls implemented to restore conditions to normal after a security incident.

A

Recovery Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls implemented to prevent a security incident or information breach.

A

Preventative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Controls to protect the organisation’s people and physical environment, such as locks, fire management, gates, and guards; may be called “operational controls” in some contexts.

A

Physical Controls

18
Q

Protect novel, useful, and nonobvious inventions.

A

Patent

19
Q

Electronic hardware and software solutions implemented to control access to information and information networks.

A

Logical (Technical) Controls

20
Q

Granting users only the accesses that are required to perform their job function.

A

Least Privilege

21
Q

Accountable for ensuring the protection of all the business information assets from intentional and unitentional loss, disclosure, alteration, destruction, and unavailability.

A

Information Security Officer

22
Q

Comes in two forms; making sure that information is processed correctly and not modified by unauthorised persons, and protecting information as it transits a network.

A

Integrity

23
Q

A security event that compromises the confidentiality, integrity, or availability of an information asset.

A

Incident

24
Q

Ensures the business focuses on core activities, clarifies who in the organisation has authority to make decisions, determines accountability for actions and responsibilities for outcomes…

A

Governance

25
Q

Authorised the President to regulate exports of civilian goods and technologies that have military applications.

A

Export Administration Act of 1979

26
Q

A process designed to identify potential events that may risk so it is within its risk appetite, and provide reasonable assurance regarding the achievement of entity objectives.

A

Enterprise Risk Management

27
Q

Is similar to due care with the exception that is a pre-emptive measure made to avoid harm to other persons or their property.

A

Due Diligence

28
Q

The care a “reasonable person” would exercise under given circumstances.

A

Due Care

29
Q

Controls designed to specify acceptable rules of behaviour within an organisation.

A

Directive Controls.

30
Q

Controls designed to discourage people from violating security directives.

A

Deterrent Controls

31
Q

Controls designed to signal warning when a security control has been breached.

A

Detective Controls

32
Q

A breach for which it was confirmed that actually disclosed (not just exposed) to an unauthorised party.

A

Data Disclosure

33
Q

Controls implemented to remedy circumstance,mitigate damage, or restore controls.

A

Corrective Controls

34
Q

Covers the expression of ideas rather than the ideas themselves; it usually protects artistic property such as writing, recording, databases, and computer programs.

A

Copyright

35
Q

Supports the principal of “least privilege” by providing that only authorised individuals, processes, or systems should have access to information on a need-to-know basis.

A

Confidentiality

36
Q

Actions that ensure behaviour that complies with established rules.

A

Compliance

37
Q

Controls that substitute for the loss of primary controls and mitigate risk down to an acceptable level.

A

Compensating Controls

38
Q

An incident that results in the disclosure or potential exposure of data.

A

Breach

39
Q

The principal that ensures that information is available and accessible to users when needed.

A

Availability

40
Q

Authorises the President to designate those items that shall be considered as defense articles and defense services and control their import and export.

A

Arms Export Control Act of 1976

41
Q

An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year.

A

Annualised Rate of Occurrence (ARO)

42
Q

Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment.

A

Administrative Controls