Information Security Risk Management Flashcards

(85 cards)

1
Q

a combination of public and private clouds

A

Hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a cloud service reserved for only one customer or company

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IaaS

A

(Infrastructure-as-a-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Paas

A

(Platform-as-a-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SaaS

A

(Software-as-a-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a cloud-based system managed by a cloud provider and shared among multiple customers, like

A

Public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It’s simply means that the application is running in a shared environment. Businesses must make sure that there is adequate isolation between different processes in shared environments.

A

Cloud Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The sender must not be able to deny sending the data or communication.

A

(non-repudiation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The recipient should be able to ______ the sender,

A

authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Its _______ must be maintained in transit (meaning the data isn’t altered)

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information must be kept __________

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are commonly used in cryptography to validate the authenticity of data.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encrypting data in transit and data at rest helps ensure data confidentiality and integrity.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software developers build procedures into an application to ensure that only authorized users gain access to it. This procedure ensure that a user is who they say they are.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Involves using a mathematical algorithm called a hash function to convert input data into a fixed-size string of characters, known as a hash value or hash code.

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • One key is used to only encrypt the data (the public key) and another key is used to decrypt (the private key).
A

Asymmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The same key used to encrypt the data is used to decrypt the data. This makes sharing the key difficult, as anyone who intercepts the message and sees the key can then decrypt your data

A

Symmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Resource owners can manage access using discretionary access control (DAC).

A

Discretionary Access Control (DAC):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authorization based on preestablished rules is known as rule-based authorization.

A

Rule-Based Authorization:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ABAC bases choices on the user, resource, and context attributes. It makes use of rules that specify circumstances affecting these characteristics.

A

ABAC (Attribute-Based Authorization):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Role-Based Authorization (RBAC): RBAC grants access permissions based on the roles allocated to users.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This authorization technique verifies the user using the authorization server’s authentication. an interoperable authentication protocol based on the OAuth 2.0 framework of specifications

A

OpenID Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This authorization technique enables an API to authenticate and provide access (access token) to the user for the requested resource or action.

A

Oauth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Its primary role in online security is that it enables you to access multiple web applications using one set of login credentials. It works by passing authentication information in a particular format between two parties, usually an identity provider (idP) and a web application
SAMlL
26
This authorization technique is a Single Sign-On format, also called SS0, in which the authentication information is transferred through XML documents signed digitally
SAML (Security Assertion Markup Language):
27
Validates that a user has permission to access the application by comparing the user�s identity with a list of authorized users
AUTHORIZATION
28
The best authentication method should not compromise a user�
PRIVACY
29
If your authentication process ask the user to follow too many instructions, or if it takes too long, or it needs repeated attempts before succeeds, there�s a risk of drop-offs and lost business, this impacts any organization, whether it�s a retailer dealing with abandoned baskets or citizens failing to return to access online government services
COMPLETION RATES
30
Its possible to make things too easy
REASSURANCE
31
Customers value convenience, and some authentication methods are better than others in this regard
CONVENIENCE
32
If authentication is overly complex, people find workarounds � consider who your service is aimed at but remember to be inclusive, most online services need to offer maximum inclusivity, so simplicity and effortlessness are always the aim
USABILITY
33
If the risk profile of the transaction is high, you�ll need a more secure method of authentication
SECURITY
34
Where you are
LOCATION FACTOR
35
What you are
INHERENCE FACTOR
36
What you have
POSSESSION FACTOR
37
What you knew
KNOWLEDGE FACTOR
38
The combination of the following factors
? Multi-Factor Authentication (MFA)
39
Security system that requires combination of distinct forms of identification in order to access something or confirm an identity
? Dual- Factor Authentication (2FA)
40
A process for securing access to a given system such as a network or a website, that identifies the party requesting access through only one category of credentials
? Single- Factor Authentication (SFA)
41
The individuality of authentication o When you claim to be someone, you need to provide further information to prove that you are who you say you are
FACTOR
42
Where you are
USERS LOCATION
43
Something who you are - Biometrics such as fingerprints
USERS CHARACTERISTICS
44
Something that you have - Tangible assets( smartphones, laptops, wearable devices), OTP
USERS POSSESSIONS
45
Something that you know; memory sharpness - Passwords/ passcodes/ pins
USERS KNOWLEDGE
46
Software developers build procedures to ensure that only authorized users gain access to it
AUTHENTICATION
47
Commonly used when logging into an account or authorizing a financial transaction remotely
AUTHENTICATION
48
Needed to securely identify online users
AUTHENTICATION
49
These vulnerabilities may be found in authentication and authorization of users, integrity of code and configurations, and mature policies and procedure.
APPLICATION SECURITY
50
Covers software vulnerabilities in web and mobile applications and application programming interfaces(APIs)
APPLICATION SECURITY
51
Risk management reporting ensures that those responsible for governance, oversight, and compliance are well-informed and can make decisions that align with the organization�s security objectives
MONITORING & REPORTING
52
Another critical aspect is the reporting processincludes creating detailed reports, presentations, or dashboards that convey complex information in a format understandable to non-technical stakeholders
MONITORING & REPORTING
53
Must monitor risk and update treatment plans regularly because new assets, vulnerabilities, threats, and controls are constantly emerging
MONITORING & REPORTING
54
A continuous process
MONITORING & REPORTING
55
Discontinuing the use of a software application
AVOIDANCE
56
Eliminating risk by changing processes, technologies, or practices
AVOIDANCE
57
For risk that are too costly or difficult to mitigate
ACCEPTANCE
58
A strategy appropriate for risk that are low in likelihood or impact
ACCEPTANCE
59
Making a conscious decision to accept the risk
ACCEPTANCE
60
Transferring the risk to another party
Transference
61
Lessen the risk by implementing a business continuity plan or educating employees on cybersecurity best practices
MITIGATION
62
Reducing the likelihood or impact of a risk
MITIGATION
63
Patching a software vulnerability or implementing a new security control
REMEDIATION
64
Eliminating the underlying vulnerability that is creating the risk
REMEDIATION
65
There is involvement
Risk
66
The likelihood of a hazard causing harm
Risk
67
something that has the potential to harm
HAZARD
68
No contactor involvement
HAZARD
69
Risk scoring is not a precise science
PRIORITIZING RISK
70
RISK = LIKELIHOOD x IMPACT
PRIORITIZING RISK
71
Not all risk are equal
PRIORITIZING RISK
72
Impact is the severity of the consequences if it does occur
RISK ASSESSMENT
73
Likelihood is the probability of the danger
RISK ASSESSMENT
74
Can be preventive like firewalls, or detective like security monitoring and log reviews
CONTROL
75
Measures that organizations implement to mitigate risk
CONTROL
76
Bugs are unintentional and seen on codes while malwares are intentional to harm the system
VULNERABILITY
77
Can be technical (software bugs, security configuration flaws) or procedural (no strong password policy, lack of training)
VULNERABILITY
78
Are weaknesses
VULNERABILITY
79
Can be internal ( malicious insiders) or external ( hackers, cyber criminals, natural disasters)
THREATS
80
Actors or events that could exploit vulnerabilities and harm assets
THREATS
81
Digital assets like data, software and intellectual property
ASSETS
82
Physical equipment like server, laptops, and mobile devices
ASSETS
83
End goal of this process is treat risk in accordance with an organizations overall risk tolerance
Information Security Risk Management
84
Phases, Identifying, assessing and treating risks
Information Security Risk Management
85
Process of managing risks associated with the use of Information Technology
Information Security Risk Management