Domain 1 - Security and Risk Management Flashcards

(86 cards)

1
Q

Annualized Loss Expectancy, ALE

A

SLE x ARO, single loss expectancy x annual rate of occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Privacy

A

Confidentiality of Personal information, Personally identifiable information, PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII

A

Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Procurement

A

Process of aquiring product from 3rd party. Security peeps should be involved early.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vendor Governance, AKA Vendor managment

A

Ensures the organization is getting consistently good quality from the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acquisitions

A

a. Risk assessment should be conducted on the purchased company before merging networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Divesture

A

Splitting up one existing business into many. Very complex in terms of determining risk and ensuring security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAAA

A

Identity, Authentication, Authorization, Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Security Governance

A

IS at the organizational level, senior management, policies, and processes, and staffing. Organizational priority as defined by leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies

A

Describe the ‘why’ and the ‘when’ of an action.

High level mgmt directives. This is MANDATORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example Policies

A

NIST - 800-12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Procedures

A

step by step guide for accomplishing a task. Low level and specific. MANDATORY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standards

A

Describe the specific use of a technology. Example “All employess will use an Asus brand XYZ model PC,” or “All PCs will use Microsoft Office version ABC”

MANDATORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Guidelines

A

Discretionary, NOT mandatory. Soft recommendations. i.e. “To create a strong password take the first letter of a sentance, and mix in some numbers and symbols.”

The Standard version of this would be - “All passwords must be at least 10 characters long, with upper case letters, lower case letters, numbers, and special characters.” The guideline example above is just suggesting an easy way to meet this standard, and also remember a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baselines

A

Discretionary, NOT mandatory.

Uniform way of implementing a standard.

Example.

Standard = harden the system for security
Baseline = harden the system by applying hte Cneter for Internet Security Linux Benchmarks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Awareness

A

Awareness changes user behavior, to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

security training

A

Provides a skillset to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Employee termination

A

firing an employee after a ladder of discipline has been exhasted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ladder of discipline

A
  1. coaching
  2. formal discusison
  3. verbal warning meeting w/ HR
  4. written warning w/ HR
  5. termination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vendor, consultant, and contractor security

A

Vendors/contractors/consultants can introuduce more risk. Should be vetted/risk managed in a simliar way to an acquisition or new hire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

outsourcing/offshoring

A

thorough and accurate risk analysis must be performed. Again in a similar way to acquisition, vendors, contractors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Preventive access control

A

i. Prevent an action from occurring
ii. Examples
1. Limited priveleges of employees
2. Admin preventive control = background checks, drug screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Detective Access Control

A

i. Alert someone during or after an attack
1. Intrusion detection system
2. Camera system
3. Door alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Corrective AC

A

i. Corrects a damaged system

1. Antivirus system that detects and quarantines bad files or deletes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Recovery Access control
Restores functionality of system and organization. - snapshots - backups - restoring files
26
Deterrent Access control
Scares threat actors away - guard - dog
27
Compensating Access control
Compensates for a weakness in another control
28
AC Type: Admin
AKA directive. implemented by creating and following organizational policy, procedrue. etc
29
Technical Controls
Software, hardware, firmware, that restricts logical access
30
Physical control
lock, fence, guard, dog, etc
31
Asset
valuable resource to protect.
32
Threat
potentially harmful occurence.
33
vulnerability
weakness that allows a threat to take place and/or cause harm.
34
Risk Formulas
threat x vulnerability = or Threat x vulnerability x impact =risk
35
AV
asset value
36
ARO
Annual rate of occurence
37
SLE
single loss expectancy
38
ALE
Annual loss expectancy
39
ALE =
SLE x ARO
40
market approach
way to value a tangible asset. Price = price of comparable assets in transactions under similar circumstances
41
income approach
value of earning capacity over life of the asset
42
cost approach
fair value = cost to replace. tangible asset
43
EF
exposure factor. percentage of asset lost due to an incident.
44
TCO
total cost of ownership. cost of a mitigating safeguard. combines upfront costs plus annual cost of maintenance.
45
ROI
return on investment. | If TCO is less than ALO your are saving
46
metrics
measurements used in risk analysis
47
Risk Choices (AMTA)
Accept the risk Mitigate the risk Transfer the risk (insurance) Avoid Risk
48
Quantitative risk analysis
Calulated, cost analysis
49
Qualitative risk analysis
comparative/relative. Risk matrix
50
RPO
Recovery Point Objective. the maximum targeted period in which data can be lost without severely impacting the recovery of operations For example, if a business process could not lose more than one day's worth of data, then the RPO for that information would be 24 hours.
51
RTO
recovery time objective | planned earliest possible recovery time.
52
MTD
Maximum Tolerable Downtime (MTD) Maximum tolerable downtime, also sometimes referred to as Maximum Allowable Downtime (MAD), represents the total amount of downtime that can occur without causing significant harm to the organization's mission.
53
Internet Activities Boards code of ethics IAB
RFC 1087 - quick 5 point description of unethical behavior on the internet.
54
Six access Control Types
``` Preventive Detective Corrective Recovery Deterrent Compensating ```
55
Three Access Control Categories - Commercial
Administrative Technical Physical
56
Categories of Computer Crime
``` Military/Inteligence attacks Business Attacks Financial attacks terrorist attacks Grudge attacks Thrill attacks Hacktivist Attacks ```
57
Shoulder Surfing
Viewing another persons monitor or keyboard
58
data diddling
making small incremental changes to files that go un-noticed in the short term.
59
Fault
Momentary loss of power
60
Blackout
complete loss of power
61
sag
momentary low voltage
62
brownout
prolonged low voltage
63
spike
momentary high voltate
64
surge
prolonged high voltage
65
Inrush
Initial surge of power associated with connecting to a power source
66
ground
Ground wire
67
Electronic vaulting
transfer of backup data to an off-site location. This is primarily a batch process of dumping backup data through communications lines
68
remote journaling
arallel processing of transactions to an alternate site
69
Database shadowing
Similar to remote journaling, but creates even more redundancy by duplicating the database sets to multiple servers
70
Data Clustering
In clustering, two or more “partners” are joined into the cluster and may all provide service at the same time.
71
Industrial IP
Intellectual property pertaining to busines. Patents, trademarks, industrial designs, geographical indications of source
72
Copyright
Literary works, artistic works.
73
Digital signature
Encrypted message digest used to verify a message hasn't been altered.
74
Three Access Control Categories - Govt
Management Technical Operational
75
Threat Analysis
Proactively monitoring and analyzing new threats, and how they can endanger your network.
76
Threat
Person or event that has the potential for impacting a resource in a negative manner.
77
Vulnerability
quality of a resource that allows a threat to be realized.
78
Warm Site
Between a hot and cold site. Typically dont' have copies of data but do have necessary equipment. Activation is less than 12 hours.
79
Cold Site
Standby facilities large enough to handle processing load of an org, and equipped with necessary electrical/environmental systems. Large lag time between outage and spinning up, often weeks.
80
Hot site.
Backup facility is maintained and in constant working order. Less than an hour or two to full functionality.
81
ISC2 Code of Ethics - Canon 1
Protect Society, The Commonwealth, and the infrastructure
82
ISC2 Code of Ethics - Canon
Act honorably, honestly, justly, responsibly, and legally
83
ISC2 Code of Ethics - Canon 3
Provide diligent and competent service to principals.
84
ISC2 Code of Ethics - Canon 4
Advance and protect the profession.
85
ISC2 Code of Ethics - Preamble Statement 1
Safety and welfare of society/common good, principles, and each other requires we adhere to high ethical standards
86
ISC2 Code of Ethics - Preamble Statement 2
Strict adherence to this code is a condition of certification.