D1 - Security and Risk Management Flashcards
(42 cards)
Any single input to a process that, if missing, would cause the process or several processes to be unable to function.
Single Points of Failure (SPOF)
Any word, name, symbol, color, sound, product shape, device, or combination of these that is used to identify goods and distinguish them from those made or sold by others.
Trademark
Proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the buisness.
Trade Secret
Determines the potential impact of disruptive events on the organization’s business processes.
Vulnerability Assessment
Defined as the difference between the original value and the remaining value of an asset after a single exploit.
Single Loss Expectancy (SLE)
A systematic process for identifying, analysing, evaluating, remedying, and monitoring risk.
Risk Management
The practice of passing on the risk in question to another entity, such as an insurance company.
Risk Transfer
The practice of the elimination of or the significant decrease in the level of risk presented.
Risk Mitigation
The practice of coming up with alternatives so that the risk in question is not realised.
Risk Avoidance
The practice of accepting certain risk(s), typically based on a business decision that may also weigh the cost versus benefit of dealing with the risk in another way.
Risk Acceptance
A combination of the probability of an event and its consequence. (ISO 27000)
Risk
An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)
Risk
The point in time to which data must be restored in order to successfully resume processing.
Recovery Point Objective (RPO)
How quickly you need to have that application’s information available after downtime has occurred.
Recovery Time Objective (RTO)
Controls implemented to restore conditions to normal after a security incident.
Recovery Controls
Controls implemented to prevent a security incident or information breach.
Preventative Controls
Controls to protect the organisation’s people and physical environment, such as locks, fire management, gates, and guards; may be called “operational controls” in some contexts.
Physical Controls
Protect novel, useful, and nonobvious inventions.
Patent
Electronic hardware and software solutions implemented to control access to information and information networks.
Logical (Technical) Controls
Granting users only the accesses that are required to perform their job function.
Least Privilege
Accountable for ensuring the protection of all the business information assets from intentional and unitentional loss, disclosure, alteration, destruction, and unavailability.
Information Security Officer
Comes in two forms; making sure that information is processed correctly and not modified by unauthorised persons, and protecting information as it transits a network.
Integrity
A security event that compromises the confidentiality, integrity, or availability of an information asset.
Incident
Ensures the business focuses on core activities, clarifies who in the organisation has authority to make decisions, determines accountability for actions and responsibilities for outcomes…
Governance