information security Flashcards

1
Q

Risk Appetite

A

Before the organization can or should proceed, it needs to
understand whether the current level of controls identified at
the end of the risk assessment process results in a level of risk
management it can accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk tolerance

A

The risk tolerance (or risk threshold) works hand in glove with
risk appetite, as it more clearly defines the range of acceptable
risk for each initiative, plan, or activity
6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Residual Risk

A

The residual risk is the amount of risk or danger associated with an action or event remaining after natural or inherent risks have been reduced by risk controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Treatment/Response Options

A
  1. Mitigation: Involves the implementation of some solution that will reduce an identified risk.
  2. Transfer: Shift risk to another entity (some or all of the risk is being
    transferred to some external entity)
  3. Avoidance: the organization abandons the risk-inducing activity altogether,
    effectively taking the asset out of service or discontinuing the
    activity so the risk is no longer present.
  4. Acceptance: Management may be willing to accept an identified risk as is, with no effort to reduce it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Other Factors Impacting Response

A

Balancing Risk and Reward to maximize profits
Organizational Design
Organizational Culture
Residual Risk
Legal and Regulatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Feasibility and Cost Benefit Analysis

A

Before deciding on the strategy for a specific asset-vulnerability-
threat combination, all readily accessible information about the
consequences of the vulnerability must be explored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cost Benefit Analysis (CBA)

A

The criterion most commonly used when evaluating a project that
implements InfoSec controls and safeguards is economic
feasibility
Organizations can begin this type of economic feasibility analysis
by valuing the information assets and determining the loss in
value if those information assets became compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cost and benefit Analysis (CBA)

A

cost: Just as it is difficult to determine the value of information, it is
difficult to determine the cost of safeguarding it
benefit: Benefit is the value to the organization of using controls to prevent
losses associated with a specific vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Other Methods of Establishing Feasibility

A

Organizational feasibility
Operational feasibility
Technical feasibility
Political feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Importance of Risk and Control Ownership

A

Ongoing activities, including control effectiveness assessments
and risk assessments, used to observe changes in risk. Security
managers perform risk monitoring to report risk levels to
executive management and to identify unexpected changes in
risk levels.
Key Risk Indicators
Training and Awareness
Risk Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Knowing yourself and knowing your enemy

A

if you know your enemy and yourself, you need not fear the result of a hundred battles. if you know yourself but not the enemy. for every victory gained you will also suffer a defeat (failure). if you know neither the enemy nor yourself, you will succumb (secome/تسلیم شدن) in every battle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asset (اَسِت )دارائی Identification

A

information system ocmponenets: People , procedures, data, software, hardware, netwroking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identifying Hardware, Software, and Network Assets

A

Many organizations use asset inventory systems to keep track of
their hardware, network, and software components
Determine which attributes of each of these information assets
should be tracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identifying People, Procedures and Data Assets

A

Responsibility for identifying, describing, and evaluating these
information assets should be assigned to managers who possess
the necessary knowledge, experience, and judgment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assessing Values for Information Assets

A

As each information asset is identified, categorized, and
classified, a relative value must be assigned
Relative values are comparative judgments made to ensure that
the most valuable information assets are given the highest priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat Assessment

A

Armed with a properly classified inventory, you can assess potential weaknesses in each information asset—a process known as threat assessment

17
Q

Identifying Threats

A

Each threat presents a unique challenge to information security and must be handled with specific controls that directly address the particular threat and the threat agent’s attack strategy

18
Q

Prioritizing Threats

A

Just as it did with information assets, the organization should conduct a weighted table analysis with threats
The organization should list the categories of threats it faces, and then select categories that correspond to the questions of interest

19
Q

Vulnerability Assessment

A

Once the organization has identified and prioritized both its information assets and the threats facing those assets it can
begin to compare information asset to threats
Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset

20
Q

Different Forms of Vulnerabilities

A

forces of nature
human error or failure
software attacks
technical hardware failures or errors
theft

21
Q

Detection Techniques

A

netwrok device: vulnerability scanning
pen testing , netwrok architecture review
software application: vulnerability scanning
business processes: process review, internal audit (بازرسی)
operating system: vulnerability scanning

22
Q

Risk Assessment

A

Assessing the relative risk for each vulnerability is accomplished via a process called risk assessment
Risk assessment assigns a risk rating or score to each specific vulnerability
While this number does not mean anything in absolute terms, it enables you to gauge the relative risk associated with each vulnerable information asset, and it facilitates the creation of comparative ratings later in the risk control process

23
Q

calculating quantified risk

A

asset value (AV) :
An asset is anything of value to an organization
exposure factor (EF) :
This represents the percentage of the asset
value that will be lost if an incident were to occur.
SLE (Single Loss Expectancy): Represents the financial loss when a threat scenario occurs
one time
AV × EF = SLE
ARO (Annual Rate of Occurrence): Number of times this will occur in a year
ARO = Number of incidents per
year
ALE (Annual Loss Expectancy): annualized loss of asset value due to threat realization
SLE × ARO = ALE

24
Q

Qualitative Risk Analysis

A

Probability or likelihood
Impact : Australian and New Zealand Risk Management Standard 4360, uses qualitative methods of determining risk based on a
threat’s probability of occurrence and expected results of a successful attack.

25
Q

What are we trying to protect?

A

we are trying to protect the following items like: customer data: it includes the customer related specific information like SSN, name , address
financial data: clients bank account, credit and debit card information
service availability and productivity: continuous access of the resources to the legitimate users
reputation and brand image

26
Q
A