Domain 1 Security & Risk Management Flashcards

(72 cards)

1
Q

What is a vulnerability

A

A weakness in a system that could be potentially be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Threat

A

Anything that can bring harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Impact

A

attempts to determine what the outcome of a successful exploitation would be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Likelihood

A

An additional input into the Risk equation outside of just threat and vulnerability

How likely successful exploitation of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quantitative risk analysis

A

always numerically based and tied directly back to money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Single Loss Expectancy

A

SLE = EF (Exposure Factor) X AV (Asset Value)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset Value

A

The value of the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exposure Factor (EF)

A

% of the asset value (AV) due to a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Annualized Rate of Occurrence (ARO)

A

Frequency of threat occurrence per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Annualized Loss Expectancy (ALE)

A

Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Principle of least privileges

A

Aka Minimum Necessary Access

Individuals only be granted the access necessary to perform their required business functions

Applies to system configuration, firewall rule sets, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rotation of duties

A

force other people to be in charge of carrying out key tasks normally performed by another employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Separation of duties

A

limit risk associated with critical functions/transactions by requiring two parties to perform what one person could otherwise perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Transfer

A

Involve 3rd party to help address the risk

Most common type is breach insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Avoidance

A

declining not to move forward with a project that introduces the unacceptable level of risk.

e.g. decommissioning of a deployed system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Mitigation

A

Take actions that decreases the risk

Reduce the risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Request for Information (RFI)

A

gather information about the available providers of the items or service being procured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Request for Proposal (RFP)

A

determine which provider will bid for the project, what their proposal looks like, and what the cost will be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Request for Quote (RFQ)

A

included as overall part of RFP

determining the cost a supplier/provider would charege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Business Partnership Agreement (BPA)

A

typically used when business operates legally as partnership

address things like ownership, profit/losses, and contributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Memorandum of Understanding/Agreement (MOU/)

A

two organizations interconnect information systems/networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Interconnection Security Agreement (ISA)

A

technical security requirements with two organization connect

Supports MOU/MOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Service Level Agreement (SLA)

A

force providers to agree to provide an acceptable level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Operating Level Agreement (OLA)

A

Internal agreement that supports SLA

determines level of service required of internal departments in order to be able to fully satisfy the details of the SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Enterprise License Agreement (ELA)
govern how an organization that licenses large volume of software is allowed to use that software
26
Acceptable Use Policy (AUP)
catch all policy that tried to define both expected user behavior and prohibited user behavior
27
Risk
=Threat x Vulnerability
28
Exploit
Process of threat taking advantage of a vulnerability
29
Threat
anything that can cause harm to an information system
30
Virus
malware that requires a carrier
31
Worm
malware that self propagates
32
Trojan
Benign-appearing function | Cover malicious function
33
Non-Disclosure Agreement (NDA)
neither employer nor employee will divulge sensitive data
34
Non-Compete Agreement
establishes employee who leaves the organization agrees not to work for a competitor
35
Non-Solicitation Agreement
Prohibits an employee that leaves the company from soliciting other employees to also leave soliciting customers of the employer for business
36
Opposite of Confidentiality Integrity Availability
Disclosure Alteration Destruction
37
Confidentiality
prevents unauthorized disclosure of data
38
Integrity
prevents unauthorized modification of assets
39
Availability
ensure required access to resource remains possible
40
Identification
weak unproven claim of identity
41
Authentication
proof that user's identify claim was legitimate
42
Authorization
proceeds after successful authentication and determines what authenticated users can do
43
Accountability
logging - details the interaction performed by the individuals
44
Compensatory Damages
Money awarded directly related to the actual losses/harm incurred (e.g. usb stick)
45
Statutory Damages
Monetary damages designated by law
46
Punitive Damages
Awards meant to punish the defendant (not tied to actual loss)
47
Legal Fees
some but not all jurisdictions considered fees a form of compensatory damages that could be awarded.
48
Civil Law
primary associated with torts, contracts, and property preponderance of evidence no jail time
49
Criminal Law
Society itself has been harmed burden of proof beyond reasonable doubt Jail time
50
Qualitative risk analysis
Not tied to dollar amount associated with potential lost Risk Rating Useful for prioritization of risk
51
Types of Authentication
Something you know (password/phrases) Something you have (token) Something you are (biometrics) Someplace you are (GPS)
52
Preventive Control
prevent attack from being successful
53
Detective Control
Tries to detect problem after an attack occurs used after the fact Hiring procedures and human resources are detective controls Rotating users and PTO discover illegal activities
54
Deterrent Control
discourages security violations
55
Compensating Control
Adding another control/layer
56
Corrective Control
reacts to an attack and takes corrective action for data recovery
57
Recovery control
Restores the operating state to normal after an attack or system failure
58
Due Care
base level of protection that a reasonable person takes to check piece of code Acting as any reasonable would
59
Due Diligence
Practice or process that ensure the decided upon standard of care is maintained
60
Patent
``` Protects invention for 20 years Must: Having utility Novelty non-obvious ```
61
Copyright
Form of Expression (paper, vinyl etc..)
62
Trademark
word, name, symbol, or device that is used in trade with goods to indicate the source of the goods Distinguish them from other goods
63
Trade Secret
Project critical intellectual property that is not publicly available
64
Risk Analysis
Determine where level of risk is unacceptable Two approaches: Qualitative and Quantitative.
65
Threat Modeling
seeks to understand threats and consider how they might negatively impact security
66
Attack Surface
represents all the ways in which an attacker could attempt to introduce data to exploit a vulnerability.
67
Security Policy
High level guidance regarding expectation This is the Why
68
Standards
Focused on how to achieve what security policies mandate This is they What
69
What makes up a policy
``` Purpose Related documents Cancellation Background Scope Policy Statement Responsibility ```
70
Standards
Provide the detailed guidance for carrying out tasks This is the How
71
Baseline
more specific implementation of the standard
72
Guidelines
Are not mandatory | Best practices