Domain 3 -InfoSec Governance & Risk Mgt Flashcards

(78 cards)

0
Q

A potentially negative occurrence

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

The cost of loss due to risk over a year

A

Annualised Loss Expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A weakness in a system

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A matched threat and vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A measure taken to reduce risk

A

Safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The cost of a safeguard

A

Total Cost of Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Money saved by deploying a safeguard

A

Return on Investment - ROI

If your annual TCO is less than your ALE then you have positive ROI and have made a good choice. If the TCO is higher than ALE, you have made a poor choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cornerstone concept of information security that seeks to prevent unauthorised disclosure of information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cornerstone concept of information security that seeks to prevent unauthorised modification of information

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cornerstone concept of information security that ensures information is available when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorised disclosure of information

A

Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorised modification of information or data

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Making systems unavailable

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a claim of who you are

A

Identity / identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proving an identity claim

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describes the action you can perform on a system once you have identified and authenticated

A

Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Holds user accountable for their actions

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Means a user cannot deny (repudiate) having performed a transaction

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You must have both authentication and integrity to have non repudiation. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Means a user should be granted the minimum amount of access (authorisation) required to do his job, but no more

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Means a user can access data if he has business need todo so.

A

Need to know. User must need to know that specific piece of information before accessing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is a layered defences that applies multiple safeguards (also called controls or measures taken to reduce risk) to protect an asset

A

Defence in depth. All controls can fail and sometimes multiple controls will fail. Deploying a range of different defence in depth safeguards lower the chance that all controls will fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Assessing risk

A

Risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Valuable resources you are trying to protect. Eg. Data, systems, buildings, property etc.

A

Assets.

The value or criticality of the assets will dictate what safeguards to deploy. People are your most valuable nasset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
A potentially harmful occurrence. Eg. Earthquake, power outage, network based worm.
Threat. A negative action that may harm a system.
25
Threat * vulnerability
Risk
26
A weakness that allows a threat to cause harm
Vulnerability
27
The severity of the damage
Impact
28
Threat * vulnerability * impact
Risk. When calculating risk using the formula, any risk including loss of human life is extremely high, and must be mitigated.
29
Allow you to perform qualitative risk analysis based on likelihood ( from rare to almost certain ) , consequences (or impact) from insignificant to catastrophic
Risk Analysis Matrix It uses a quadrant to map the likelihood of a risk occurring against the consequences or impact the risk would have.
30
Allows you to determine the annual cost of a loss due to a risk as well as allows you to make informed decisions to mitigate the risk
Annualised Loss Expectance - ALE
31
The value of an asset that you are trying not protect
Asset value
32
Is the percentage of value an asset lost due to an incident
Exposure Factor - EF
33
Cost of single loss
Single Loss Expectancy - SLE
34
Number of losses you suffer per year
Annual Rate Of Occurrence - ARO
35
Is your yearly cost due to a risk
Annualised Loss Expectancy -ALE
36
The total cost of a mitigating safeguards
Total Cost Of Ownership - TCO
37
Asset value * Exposure Factor
Single Loss Expectancy - SLE
38
SLE * ARO
ALE
39
What are the risk choices?
1. Accept the risk if TCO is higher than ALE 2. Mitigate the risk 3. Transfer the risk - Insurance 4. Avoid the risk
40
A risk analysis that uses hard metrics such as dollars. It requires you to calculate the quantity of the asset you are protecting. It is more objective.
Quantitative Risk Analysis
41
A risk analysis that uses simple approximate values. The Risk Analysis Matrix can also be use. This type is more subjective.
Qualitative Risk Analysis
42
Is information security at the organisation level: senior management, policies, processes and staffing
Information Security Governance
43
A high level management directives; is mandatory and does not delve into specifics
Policy
44
Step by step guide for accomplishing a task; low level and specific; are mandatory
Procedures
45
Describes the specific use of technology often applied to hardware or software ; are mandatory
Standards
46
Are recommendations which are discretionary
Guidelines
47
Uniform ways of implementing a safeguard; are discretionary
Baselines
48
Changes user behaviour about security
Security Awareness
49
Teaches a user how to do something
Security Training
50
Its roles and responsibility is to ensure all assets are protected and creates a security program
Senior Management
51
The information owner or business owner
Data Owner
52
He provides hands on protection of assets such as data. Don't make decisions
Custodian
53
He follow rules and comply with mandatory policies and procedures
User
54
Protection of the confidentiality of persona information (PII)
Privacy
55
Doing what is reasonable person would do. Prudent man rule
Due Care
56
Management of due care
Due Diligence
57
Opposite of due care
Gross negligence
58
A consensus of the best way to protect CIA of assets
Best Practice
59
The use of third party to provide IT support or services
Outsourcing
60
Is outsourcing to another country
Offshoring
61
Means verifying compliance to a security control framework.
Auditing
62
What is OCTAVE?
Operationally Critical Threat, Asset and Vulnerability Evaluation. A Risk Management Framework from Carnegie Mellon University
63
What are the 3 phases for managing risks according to OCTAVE?
Phase 1 - identifies staff knowledge, assets and threats Phase 2 - identifies vulnerabilities and evaluates safeguards Phase 3 - conducts risk analysis and develop the risk mitigation strategy.
64
Risk management guide for information technology systems developed by NIST
NIST SP-800-30
65
9 Steps Risk Analysis Process (NIST SP800-30)
1. System characterisation - scope 2. Threat identification 3. Vulnerability identification 4. Control analysis - Safeguard 5. Likelihood determination 6. Impact analysis 7. Risk determination 8. Control recommendation 9. Results documentation
66
Information Technology/Security techniques; codes of practice of information security management introduced by ISO
ISO/IEC 17799:2005
67
11 Areas of ISO 17799
1. Policy 2. Organisation of Information Security 3. Asset Management 4. Human Resources Security 5. Physical and Environmental Security 6. Communications and operations management 7. Access Control 8. Information systems acquisition,development and maintenance 9. Information security incident management 10. Business Continuity Management 11. Compliance
68
Is a control framework created by ISACA for deploying/employing information security governance best practices with in an organisation.
COBIT - Control Objectives for Information and related Technology
69
4 Domains of COBIT
1. Plan and organise 2. Acquire and implement 3. Deliver and support 4. Monitor and evaluate
70
Is a framework for providing best services in IT Service Management or ISTM
ITIL - information technology infrastructure library
71
5 ITIL Service Management Pactices
1. Service strategy 2. Service design 3. Service transition 4. Service operation 5. Continual Service Improvement
72
Is a detailed inspection that verifies whether a system meets the documented security requirements
Certification
73
Data owner's acceptance of the risk represented by that system.
Accreditation
74
NIST guide for Credit and Accreditation
NIST SP-800-37
75
4 Steps Process of NIST SP800-37 (Certification and Accreditation)
1. Initiation phase 2. Security certification phase 3. Security accreditation phase 4. Continuous monitoring phase
76
Doing what is morally right
Ethics
77
What are the four ISC2 canons - code of ethics
In order: 1. Protect society, the commonwealth and the infrastructure 2. Act honourably, honestly, justly, responsibly and legally 3. Provide diligent and competent service to principals 4. Advance and protect the profession