Focused ECIHv2 Study Guide Flashcards
(159 cards)
What is the Risk equation?
Risk = Threat X Vulnerabilty
In Order, What is the Risk Assessment Process?
- System Characterization
- Threat Identification
- Vulnerability Identification
- Control Analysis
- Likelihood Analysis
- Impact Analysis
- Risk Determination
- Control Recommendation
- Risk Assessment Report
What is PILAR?
Risk Analysis and Management Software
What is the purpose of Incident Response Orchestration - Automation?
To automatically notify a person when there’s an incident.
ISO/IEC 27000
Overview and introduction of the information security management systems
ISO/IEC 27001
The Information Security Management System (ISMS) requirements
ISO/IEC 27002
Code of practice for information security controls
ISO/IEC 27003
Information Security Management System implementation guidance
ISO/IEC 27004
Information Security Management
ISO/IEC 27005
Information Security Risk Management
ISO/IEC 27006
Requirements for bodies providing audit and certification of Information Security Management Systems
ISO/IEC 27007
Guidelines for Information Security Management Systems auditing
ISO/IEC TR 27008
Guidance for auditors on ISMS controls
ISO/IEC 27009
Guidelines for those producing sector or industry-specific ISO27k standards
ISO/IEC 27010
Information Security Management for inter-sector and inter-organizational communications
NIST 800-86
Incident Response Approach
NIST 800-61 Rev.2
Incident handling guide
RFC 2196
RFC 2196 builds on RFC 1244 and is a guide to setting computer security policies
COBIT IT
Governance framework that emphasizes compliance and helps increase the value of ID
NIST 800-61
Step-by-step instructions for new and established incident response teams
Graham-Leach-Bliley Act (GLBA)
Deals with financial institutions, specifically PII
Sarbanes-Oxley (SOX)
Fair and accurate corporate reporting. Deals with corporate fraud.
General Data Protection Regulations (GDPR)
Article 32: Speaks to the CIA triad and the ability to restore PII on time
Article 33: Must notify if data is breached within 72 hours, if possible
NIST: Incident Handling Criteria and Reporting Timeframe
Cat 0 Exercise/Network Defense Testing Cat 1 Unauthorized Access – 1 hour Cat 2 DOS – 2 hours Cat 3 Malicious code – 1 hour Cat 4 Inappropriate usage - Weekly Cat 5 Scan/Probe/Attempting access – Monthly Cat 6 Investigation