D1 - Security and Risk Management Flashcards

(42 cards)

1
Q

Any single input to a process that, if missing, would cause the process or several processes to be unable to function.

A

Single Points of Failure (SPOF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any word, name, symbol, color, sound, product shape, device, or combination of these that is used to identify goods and distinguish them from those made or sold by others.

A

Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the buisness.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Determines the potential impact of disruptive events on the organization’s business processes.

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defined as the difference between the original value and the remaining value of an asset after a single exploit.

A

Single Loss Expectancy (SLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A systematic process for identifying, analysing, evaluating, remedying, and monitoring risk.

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The practice of passing on the risk in question to another entity, such as an insurance company.

A

Risk Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The practice of the elimination of or the significant decrease in the level of risk presented.

A

Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of coming up with alternatives so that the risk in question is not realised.

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of accepting certain risk(s), typically based on a business decision that may also weigh the cost versus benefit of dealing with the risk in another way.

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A combination of the probability of an event and its consequence. (ISO 27000)

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The point in time to which data must be restored in order to successfully resume processing.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How quickly you need to have that application’s information available after downtime has occurred.

A

Recovery Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls implemented to restore conditions to normal after a security incident.

A

Recovery Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls implemented to prevent a security incident or information breach.

A

Preventative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Controls to protect the organisation’s people and physical environment, such as locks, fire management, gates, and guards; may be called “operational controls” in some contexts.

A

Physical Controls

18
Q

Protect novel, useful, and nonobvious inventions.

19
Q

Electronic hardware and software solutions implemented to control access to information and information networks.

A

Logical (Technical) Controls

20
Q

Granting users only the accesses that are required to perform their job function.

A

Least Privilege

21
Q

Accountable for ensuring the protection of all the business information assets from intentional and unitentional loss, disclosure, alteration, destruction, and unavailability.

A

Information Security Officer

22
Q

Comes in two forms; making sure that information is processed correctly and not modified by unauthorised persons, and protecting information as it transits a network.

23
Q

A security event that compromises the confidentiality, integrity, or availability of an information asset.

24
Q

Ensures the business focuses on core activities, clarifies who in the organisation has authority to make decisions, determines accountability for actions and responsibilities for outcomes…

25
Authorised the President to regulate exports of civilian goods and technologies that have military applications.
Export Administration Act of 1979
26
A process designed to identify potential events that may risk so it is within its risk appetite, and provide reasonable assurance regarding the achievement of entity objectives.
Enterprise Risk Management
27
Is similar to due care with the exception that is a pre-emptive measure made to avoid harm to other persons or their property.
Due Diligence
28
The care a "reasonable person" would exercise under given circumstances.
Due Care
29
Controls designed to specify acceptable rules of behaviour within an organisation.
Directive Controls.
30
Controls designed to discourage people from violating security directives.
Deterrent Controls
31
Controls designed to signal warning when a security control has been breached.
Detective Controls
32
A breach for which it was confirmed that actually disclosed (not just exposed) to an unauthorised party.
Data Disclosure
33
Controls implemented to remedy circumstance,mitigate damage, or restore controls.
Corrective Controls
34
Covers the expression of ideas rather than the ideas themselves; it usually protects artistic property such as writing, recording, databases, and computer programs.
Copyright
35
Supports the principal of "least privilege" by providing that only authorised individuals, processes, or systems should have access to information on a need-to-know basis.
Confidentiality
36
Actions that ensure behaviour that complies with established rules.
Compliance
37
Controls that substitute for the loss of primary controls and mitigate risk down to an acceptable level.
Compensating Controls
38
An incident that results in the disclosure or potential exposure of data.
Breach
39
The principal that ensures that information is available and accessible to users when needed.
Availability
40
Authorises the President to designate those items that shall be considered as defense articles and defense services and control their import and export.
Arms Export Control Act of 1976
41
An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year.
Annualised Rate of Occurrence (ARO)
42
Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment.
Administrative Controls