Domain 1 - Security and Risk Management Flashcards

1
Q

Annualized Loss Expectancy, ALE

A

SLE x ARO, single loss expectancy x annual rate of occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Privacy

A

Confidentiality of Personal information, Personally identifiable information, PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII

A

Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Procurement

A

Process of aquiring product from 3rd party. Security peeps should be involved early.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vendor Governance, AKA Vendor managment

A

Ensures the organization is getting consistently good quality from the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acquisitions

A

a. Risk assessment should be conducted on the purchased company before merging networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Divesture

A

Splitting up one existing business into many. Very complex in terms of determining risk and ensuring security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IAAA

A

Identity, Authentication, Authorization, Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Security Governance

A

IS at the organizational level, senior management, policies, and processes, and staffing. Organizational priority as defined by leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies

A

Describe the ‘why’ and the ‘when’ of an action.

High level mgmt directives. This is MANDATORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example Policies

A

NIST - 800-12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Procedures

A

step by step guide for accomplishing a task. Low level and specific. MANDATORY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standards

A

Describe the specific use of a technology. Example “All employess will use an Asus brand XYZ model PC,” or “All PCs will use Microsoft Office version ABC”

MANDATORY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Guidelines

A

Discretionary, NOT mandatory. Soft recommendations. i.e. “To create a strong password take the first letter of a sentance, and mix in some numbers and symbols.”

The Standard version of this would be - “All passwords must be at least 10 characters long, with upper case letters, lower case letters, numbers, and special characters.” The guideline example above is just suggesting an easy way to meet this standard, and also remember a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baselines

A

Discretionary, NOT mandatory.

Uniform way of implementing a standard.

Example.

Standard = harden the system for security
Baseline = harden the system by applying hte Cneter for Internet Security Linux Benchmarks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Awareness

A

Awareness changes user behavior, to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

security training

A

Provides a skillset to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Employee termination

A

firing an employee after a ladder of discipline has been exhasted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ladder of discipline

A
  1. coaching
  2. formal discusison
  3. verbal warning meeting w/ HR
  4. written warning w/ HR
  5. termination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vendor, consultant, and contractor security

A

Vendors/contractors/consultants can introuduce more risk. Should be vetted/risk managed in a simliar way to an acquisition or new hire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

outsourcing/offshoring

A

thorough and accurate risk analysis must be performed. Again in a similar way to acquisition, vendors, contractors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Preventive access control

A

i. Prevent an action from occurring
ii. Examples
1. Limited priveleges of employees
2. Admin preventive control = background checks, drug screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Detective Access Control

A

i. Alert someone during or after an attack
1. Intrusion detection system
2. Camera system
3. Door alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Corrective AC

A

i. Corrects a damaged system

1. Antivirus system that detects and quarantines bad files or deletes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Recovery Access control

A

Restores functionality of system and organization.

  • snapshots
  • backups
  • restoring files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Deterrent Access control

A

Scares threat actors away

  • guard
  • dog
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Compensating Access control

A

Compensates for a weakness in another control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AC Type: Admin

A

AKA directive. implemented by creating and following organizational policy, procedrue. etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Technical Controls

A

Software, hardware, firmware, that restricts logical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Physical control

A

lock, fence, guard, dog, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Asset

A

valuable resource to protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Threat

A

potentially harmful occurence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

vulnerability

A

weakness that allows a threat to take place and/or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Risk Formulas

A

threat x vulnerability =

or

Threat x vulnerability x impact =risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

AV

A

asset value

36
Q

ARO

A

Annual rate of occurence

37
Q

SLE

A

single loss expectancy

38
Q

ALE

A

Annual loss expectancy

39
Q

ALE =

A

SLE x ARO

40
Q

market approach

A

way to value a tangible asset. Price = price of comparable assets in transactions under similar circumstances

41
Q

income approach

A

value of earning capacity over life of the asset

42
Q

cost approach

A

fair value = cost to replace. tangible asset

43
Q

EF

A

exposure factor. percentage of asset lost due to an incident.

44
Q

TCO

A

total cost of ownership. cost of a mitigating safeguard. combines upfront costs plus annual cost of maintenance.

45
Q

ROI

A

return on investment.

If TCO is less than ALO your are saving

46
Q

metrics

A

measurements used in risk analysis

47
Q

Risk Choices (AMTA)

A

Accept the risk

Mitigate the risk

Transfer the risk (insurance)

Avoid Risk

48
Q

Quantitative risk analysis

A

Calulated, cost analysis

49
Q

Qualitative risk analysis

A

comparative/relative. Risk matrix

50
Q

RPO

A

Recovery Point Objective. the maximum targeted period in which data can be lost without severely impacting the recovery of operations

For example, if a business process could not lose more than one day’s worth of data, then the RPO for that information would be 24 hours.

51
Q

RTO

A

recovery time objective

planned earliest possible recovery time.

52
Q

MTD

A

Maximum Tolerable Downtime (MTD)
Maximum tolerable downtime, also sometimes referred to as Maximum Allowable Downtime (MAD), represents the total amount of downtime that can occur without causing significant harm to the organization’s mission.

53
Q

Internet Activities Boards code of ethics IAB

A

RFC 1087 - quick 5 point description of unethical behavior on the internet.

54
Q

Six access Control Types

A
Preventive
Detective
Corrective
Recovery
Deterrent
Compensating
55
Q

Three Access Control Categories - Commercial

A

Administrative
Technical
Physical

56
Q

Categories of Computer Crime

A
Military/Inteligence attacks
Business Attacks
Financial attacks
terrorist attacks
Grudge attacks
Thrill attacks
Hacktivist Attacks
57
Q

Shoulder Surfing

A

Viewing another persons monitor or keyboard

58
Q

data diddling

A

making small incremental changes to files that go un-noticed in the short term.

59
Q

Fault

A

Momentary loss of power

60
Q

Blackout

A

complete loss of power

61
Q

sag

A

momentary low voltage

62
Q

brownout

A

prolonged low voltage

63
Q

spike

A

momentary high voltate

64
Q

surge

A

prolonged high voltage

65
Q

Inrush

A

Initial surge of power associated with connecting to a power source

66
Q

ground

A

Ground wire

67
Q

Electronic vaulting

A

transfer of backup data to an off-site location. This is primarily a batch process of dumping backup data through communications lines

68
Q

remote journaling

A

arallel processing of transactions to an alternate site

69
Q

Database shadowing

A

Similar to remote journaling, but creates even more redundancy by duplicating the database sets to multiple servers

70
Q

Data Clustering

A

In clustering, two or more “partners” are joined into the cluster and may all provide service at the same time.

71
Q

Industrial IP

A

Intellectual property pertaining to busines. Patents, trademarks, industrial designs, geographical indications of source

72
Q

Copyright

A

Literary works, artistic works.

73
Q

Digital signature

A

Encrypted message digest used to verify a message hasn’t been altered.

74
Q

Three Access Control Categories - Govt

A

Management
Technical
Operational

75
Q

Threat Analysis

A

Proactively monitoring and analyzing new threats, and how they can endanger your network.

76
Q

Threat

A

Person or event that has the potential for impacting a resource in a negative manner.

77
Q

Vulnerability

A

quality of a resource that allows a threat to be realized.

78
Q

Warm Site

A

Between a hot and cold site. Typically dont’ have copies of data but do have necessary equipment. Activation is less than 12 hours.

79
Q

Cold Site

A

Standby facilities large enough to handle processing load of an org, and equipped with necessary electrical/environmental systems. Large lag time between outage and spinning up, often weeks.

80
Q

Hot site.

A

Backup facility is maintained and in constant working order. Less than an hour or two to full functionality.

81
Q

ISC2 Code of Ethics - Canon 1

A

Protect Society, The Commonwealth, and the infrastructure

82
Q

ISC2 Code of Ethics - Canon

A

Act honorably, honestly, justly, responsibly, and legally

83
Q

ISC2 Code of Ethics - Canon 3

A

Provide diligent and competent service to principals.

84
Q

ISC2 Code of Ethics - Canon 4

A

Advance and protect the profession.

85
Q

ISC2 Code of Ethics - Preamble Statement 1

A

Safety and welfare of society/common good, principles, and each other requires we adhere to high ethical standards

86
Q

ISC2 Code of Ethics - Preamble Statement 2

A

Strict adherence to this code is a condition of certification.