Exam 1 Flashcards

(62 cards)

1
Q
Which security principle is opposite of disclosure?
A) integrity
B) availability
C) confidentiality
D) authorization
A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Opposite of corruption?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Opposite of destruction?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Opposite of disapproval?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security policy

A

Administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCTV and locks

A

Physical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data backups

A

Technical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability?

A

An absence or weakness of a countermeasure that is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat?

A

Vulnerability is identified or exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat agent?

A

Entity that carries out a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exposure?

A

Organizational asset exposed to losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Countermeasure or safeguard?

A

Control that reduces risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of technical threats?

A

Hardware/ software failure
Malicious code
New technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Human threat agents?

A

Malicious and non malicious insiders and outsiders
Terrorists
Spies
Terminated personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Natural threat agents?

A
Floods
Fires
Tornadoes 
Hurricanes 
Earthquakes 
Other natural disaster or weather event
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Environmental threat agents?

A

Power or utility failure
Traffic issues
Biological warfare
Hazardous material issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SLE?

A

Single-Loss expectancy. Monetary impact of threat occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ARO

A

Annualized rate of occurrence. How often a threat may occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ALE

A

Annual lose expectancy. Expected risk factor of an annual threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EF

A

Exposure Factor. Percent value or or functionality loss after threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advisory security policies?

A

Instruction on acceptable and unacceptable activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Informative security policies?

A

Provide info on topics and act as educational tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Regulatory security policies?

A

Address specific industry regulations, including mandatory standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

System-specific security policies?

A

Address security for a specific computer, network, technology, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Computer assisted crime?
Computer used as a tool to help commit a crime
26
Incidental computer crime?
Computer involved in a crime but not the victim or the attacker
27
Computer targeted crime?
Computer is victim and the attacker means harm against the computer and its victim
28
Computer prevalence crime?
Happen because computer are so widely used
29
4 stages of security program lifecycle?
1. Plan and organize 2. Implement 3. Operate and maintain 4. Monitor and evaluate
30
CSO?
Chief security officer. Responsible for security effort. Reports directly to CEO
31
CPO?
Chief privacy officer. Responsible for private information. Reports directly to CIO
32
CFO?
Chief financial officer. Responsible for all financial aspects of the organization
33
Acceptable use policy?
Directive control. Lists proper procedures personnel must follow.
34
Corrective controls?
Reduce effect of attack
35
Detective controls?
Detect attack while occurring and inform proper authorities
36
Compensative controls?
Sub for primary controls to mitigate risk
37
Attacker centric threat model?
Profiles attackers characteristics, skills, and motivations to exploit vulnerabilities
38
Application centric threat modeling?
Uses application diagrams to analyze threats
39
Assets centric threat modeling?
Uses attack trees, attack graphs, or display patterns to determine how an asset can be attack.
40
risk avoidance
terminating the risk factor or chosing something not as risky
41
residual risk
the risk left over after safe guards
42
risk transfer
is passing the risk on to a third party
43
risk migration
is defining the acceptable risk level
44
data owner
determine the classification level or the data
45
data custodian
implements the classification to the data
46
security administrator
maintains security devices
47
corrective control
reduces the effect of an attack
48
compensative control
substitute for primary access control
49
preventive control
prevents an attack from happening
50
zachmans framework
two dimensional model that intersects 6 communications and various veiwpoints
51
what do employees sign to protect trade secrets
NDA or non-disclosure agreements
52
due care
took all measures possible to prevent a security breach
53
due diligence
investigated all vulnerabilities
54
CRAMM?
CCTA Risk analysis and management method. Steps: 1. Indemnify value and assets 2. Identify threats and vulnerabilities and calculate risks 3. Identify and prioritize countermeasures
55
what not to worry about during a merger
the costs
56
Information life cycle?
1. Create/ receive 2. Distribute 3. Use 4. Maintain 5. Dispose/ store
57
Data quality?
Fitness of data for use
58
Data remanence?
Clearing Purging Destruction
59
Media destruction?
Physical Chemical Magnetic
60
primary objective during a security incident is
minimal disruption to the organizations mission
61
``` Which framework uses six communication questions that intersect with six layers? Six Sigma SABSA ITIL ISO/ISEC 27000 Series ```
SABSA
62
``` Which of the following is a 2 dimensional model that intersects communication interrogatives with various viewpoints? SABSA Zachman framework TOGAF ITIL ```
Zachman framework