Domain 1 - Security and Risk Management Flashcards
(240 cards)
what is the DRP (disaster recover plan)
- the plan for recovering from a disaster impacting IT and returning the IT infrastructure to operations
- focuses on the technical aspects of recovery
Control Types and Purposes
- Preventive controls, for reducing risk
- Detective controls, for identifying violations and incidents
- Corrective controls, for remedying violations and incidents and improving existing preventive and detective controls
4, Deterrent controls, for discouraging violations - Recovery controls, for restoring systems and information
- Compensating controls, for providing alternative ways of achieving a task
reduction analysis 5 points to check
1, trust boundaries - any location where the level of trust or security changes. maybe where an application needs a specific role or privilege is required to access a resource or operation
- Data flow paths - the movement of data between locations and any exposures for breaches
- input points - Locations where external inputs are received. for example: on a web form where there is the potential for SQL injections and the protections need to prevent that
- Privileged operations - any activity that requires greater privilege than that of a standard user account.
- Details about security stance and approach - declaration of security policy, security foundations, and security assumptions
attributes of Trademarks
- -Protects brands – symbol, word, slogan, design, color or logo that can distinguish one source from another source
- they last as long as your business continues to use them
- not required by law by registering with PTO (patent trademark office) confers many benefits on the trademark owner
example: Nike trademark and logo
- not required by law by registering with PTO (patent trademark office) confers many benefits on the trademark owner
What programming method does vast work with
Agile
What are three ways integrity works for us
- Preventing unauthorized subjects from making modifications
- Preventing authorized subjects from making unauthorized modifications
- Maintaining consistency of objects so that they are true and accurate
2 focus items of security from a business aspect are?
- enable business
- enable profit
- increase risk awareness
- increase value
- enable business
- increase value
7 steps of NIST RMF, what happens at select
Select an initial set of controls for the system, tailor and document the controls as needed to mitigate risk to an acceptable level based on an assessment of risk.
two key elements of risk management
- risk assessment
- risk treatment
can responsibility be delegated
yes
what are the 6 Access Control Types
- Preventative
- Detective
- Corrective
- Recovery
- Deterrent
- Compensating
security planning and definitions (3)
- Strategic - long term stable plan that should include a risk assessment (5 yr horizon, annual updates)
- Tactical - midterm plan developed to provide more details on goals of the strategic plan (usually 1 year) a little more flexible, can make some ad hoc adjustments if needed
- Operational - short-term, highly detailed plan based on the strategic and tactical plans (monthly, quarterly) this will have budget figures, staffing assignments, scheduling and implementation procedures
is COBIT threat model
no, its a security control framework. sometimes described as an framework for IT management and governance
The official four canons. number three is?
Provide diligent and competent service to principals
explain MTD
- maximum tolerable downtime
- is the measurement in time that determines when an event changes from and incident to a disaster
- The total time a system can be inoperable before our organization is severely impacted
definition of asset
a resource, process, product, or system that has some value to an organization. could be tangible(computer, data, software) could be intangible (privacy, access, public image)
could have a tangible price(purchase price)
could have intangible value (competitive advantage)
possible countermeasures to keep availability safe are
a. strict access controls / authentication
b. continuous monitoring
c. firewalls & routers to prevent DoS / DDoS attacks
d. redundant system design
e. periodic testing of backup systems
define qualitative
relative ranking system using words like High, medium, low
what is a seven-step
process for aligning business objectives and technical requirements, taking into
account compliance issues and business analysis
pasta threat modeling
What does ALE stand for and Define it
annualized loss expectancy - estimated annual loss for a threat or even in dollars
what is residual risk
risk that is left over once safeguards or controls are in place
What life cycle does vast work with
SDLC - software development life cycle
define impact
anything that negatively impacts the organization if a risk is realized.
examples: lost of confidentiality, integrity, availability, financial, reputational, non-compliance, lost of life etc.
what is inherent risk
newly identified risk not yet addressed with risk management strategies