Information Security Risk Management Flashcards
(233 cards)
What is the PRIMARY reason an enterprise would study cybersecurity threats? To establish:
A.a threat library.
B.a control baseline.
C.incident response playbooks.
D.a threat analysis.
D is the correct answer.
Justification
Threat libraries may be compiled in the course of threat analysis, but updating the threat library is not the main reason to study cybersecurity threats.
Although studying cybersecurity threats may help in designing and baselining controls, creating a control baseline is based on the overall risk (business impact), not threats alone.
An incident response playbook is set of processes for responding and resolving incidents. Studying cyberthreats certainly adds to an incident response plan, but that is not the reason to conduct cybersecurity threat analysis.
The main goal of threat analysis is to understand how the enterprise is positioned in the threat landscape. Threat analysis also supports decisions to prioritize control activities to mitigate the most critical risk. Threat analysis is an important factor in calculating risk value.
The fact that an enterprise may suffer a significant disruption as the result of a distributed denial-of-service (DDoS) attack is considered:
A.an intrinsic risk.
B.a systemic risk.
C.a residual risk.
D.an operational risk.
D is the correct answer.
Justification
Intrinsic risk is the result of underlying internal and external factors that are not readily subject to controls.
Systemic risk refers to the collapse of an entire system as a result of the risk imposed by system interdependencies.
Residual risk is the level of risk remaining after controls and countermeasures are implemented, and it may approach intrinsic risk.
Operational risk is the risk to an enterprise as a result of its internal and external operations.
An enterprise has learned of a security breach at another company that uses similar technology. The FIRST thing the information security manager should do is:
A.assess the likelihood of incidents from the reported cause.
B.discontinue the use of the vulnerable technology.
C.report to senior management that the enterprise is not affected.
D.remind staff that no similar security breaches have taken place.
A is the correct answer.
Justification
The security manager should first assess the likelihood of a similar incident occurring, based on available information.
Discontinuing the use of the vulnerable technology would not necessarily be practical because it would likely be needed to support the business.
Reporting to senior management that the enterprise is not affected due to controls already in place would be premature until the information security manager can first assess the impact of the incident.
Until this has been researched, it is not certain that no similar security breaches have taken place.
Which of the following would present the GREATEST risk to information security?
A.Virus signature files updates are applied to all servers every day.
B.Security access logs are reviewed within five business days.
C.Critical patches are applied within 24 hours of their release.
D.Security incidents are investigated within five business days.
D is the correct answer.
Justification
Virus signature files updated every day do not pose a great risk.
Reviewing security access logs within five days is not the greatest risk.
Patches applied within 24 hours is not a significant risk.
Waiting to investigate security incidents can pose a major risk.
Which of the following choices BEST reveals the evolving nature of attacks in an online environment?
A.A high-interaction honeypot
B.A rogue access point
C.Industry tracking groups
D.A vulnerability scanner
C is the correct answer.
Justification
A honeypot is used to lure a hacker and learn the methods of attacks. However, an attacker may or may not use known methods of attacks. Also, the honeypot will only reveal attacks directed against the enterprise, not the overall nature of attacks occurring in the broader online environment.
A rogue access point is put in place by an attacker to lure legitimate users to connect to it.
Industry tracking groups, such as Infraguard, US Computer Emergency Readiness Team (CERT) and Internet Storm Center, provide insight into what sort of attacks are affecting enterprises on a national or global scale.
Even if a vulnerability scanner is updated regularly, it will reveal vulnerabilities, not attacks.
Which of the following actions would BEST help to enhance third-party risk management?
A. Outsourcing all critical services to reduce internal workload
B. Establishing airtight contracts with third-party vendors
C. Conducting regular security audits of third-party vendors
D. Creating a dedicated internal team to focus on third-party risk management
C is the correct answer.
Justification
While outsourcing critical services can reduce internal workload, it may also increase dependency on third-party vendors and potentially expose the organization to greater risk. Relying solely on outsourcing without adequate risk management measures can diminish control over critical operations and compromise security.
While it is important to include the security requirements in the contract, it is necessary to periodically audit the third party to ensure that the vendor is following all the contractual requirements for effective risk management.
Regular security audits of third-party vendors involve assessing their security practices, systems, and processes to identify vulnerabilities and ensure compliance with security standards and contractual agreements. This proactive measure helps mitigate risk associated with third-party relationships and strengthens overall cybersecurity resilience.
While having a dedicated team focusing on risk management is important, conducting regular audits of the vendors is more effective in enhancing risk management.
Which function is PRIMARILY responsible for cultivating and implementing a culture of risk management within organizations using artificial intelligence (AI) systems?
A. Governance
B. Information security
C. Information technology
D. Compliance
A is the correct answer.
Justification
Governance is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risk is managed appropriately, and verifying that the enterprise’s resources are used responsibly. It is infused throughout artificial intelligence (AI) risk management and enables the other functions of the process. Strong governance drives and enhances internal practices and norms to facilitate organizational risk culture.
Information security is responsible for addressing AI security risk in the information security program, developing and maintaining AI-related security policies, procedures, and processes, and working closely with the governance function in establishing AI risk assessment activities in support of a mature AI risk culture.
IT is responsible for IT strategy and IT project management activities, developing and maintaining AI-related policies, procedures, and processes, and working closely with the governance function in support of a mature AI risk culture.
Compliance teams evaluate the business opportunity that AI brings into the organization and carefully consider its impact from the legal and regulatory perspective to ensure that AI systems comply with industry-specific standards. The compliance function is not responsible for cultivating and implementing a culture of risk management.
Which of the following provides the BEST means for identifying a user’s unauthorized expanded scope of an artificial intelligence (AI) system beyond its original purpose?
A. Business impact analysis
B. Risk register
C. Request for change
D. Risk assessment
D is the correct answer.
Justification
A business impact analysis is a study identifying the impact regarding different disaster scenarios and is not used to identify new risk in the organization.
The risk register is used to document specific factors associated with identified risk and is not used to identify new risk within the organization.
A request for change is submitted when a change to software or a system is required. It is not used to identify new risk within the organization.
A risk assessment is the best means of identifying new risk in the organization, as business functions should communicate the expanded use of new tools and software employed for business purposes.
The BEST process for assessing an existing risk level is:
A.an impact analysis.
B.a security review.
C.a vulnerability assessment.
D.a threat analysis.
B is the correct answer.
Justification
An impact analysis is used to determine potential impact in the event of the loss of a resource.
A security review is used to determine the current state of security for various program components.
While vulnerability assessments help identify and classify weakness in the design, implementation, operation or internal control of a process, they are only one aspect of a security review.
A threat analysis is not normally a part of a security review. Threat assessments evaluate the type, scope and nature of events or actions that can result in adverse consequences; identification is made of the threats that exist against enterprise assets.
Which of the following is the GREATEST concern for an enterprise in which there is a widespread use of mobile devices?
A.There is an undue reliance on public networks.
B.Batteries require constant recharges.
C.There is a lack of operating system standardization.
D.Mobile devices can be easily lost or stolen.
D is the correct answer.
Justification
The fact that mobile devices must be connected to public networks creates a security risk that can be exploited in the public space, but appropriate security controls can mitigate the risk.
The need to constantly recharge batteries is not a significant security concern.
While the lack of operating system standardization is a concern, it is not as great as the loss of devices.
Because of their size, mobile devices can be easily lost or stolen and sensitive information disclosed.
Which of the following is the MAIN reason for performing risk assessment on a continuous basis?
A.The security budget must be continually justified.
B.New vulnerabilities are discovered every day.
C.The risk environment is constantly changing.
D.Management needs to be continually informed about emerging risk.
C is the correct answer.
Justification
Justification of a budget should never be the main reason for performing a risk assessment.
New vulnerabilities should be managed through a patch management process.
The risk environment is impacted by factors such as changes in technology and business strategy. These changes introduce new threats and vulnerabilities to the enterprise. As a result, risk assessment should be performed continuously.
Informing management about emerging risk is important but is not the main driver for determining when a risk assessment should be performed.
Which of the following is the MOST important action an information security manager should take after user acceptance testing (UAT) for a new IT solution is completed?
A. Review the results of the UAT for security-related testing considerations.
B. Perform an internal audit to complete the post-implementation review.
C. Ensure logs from the solution are captured from monitoring activities.
D. Conduct a vulnerability assessment of the enterprise architecture (EA).
D is the correct answer.
Justification
Reviewing the results of user acceptance testing (UAT) is required, but it may not indicate vulnerabilities introduced while moving the new IT solution to production.
The post-implementation review should be performed after the new system is in operation to ensure the system is stabilized and initial issues are resolved.
Including operational logs in log monitoring systems will help with detecting threat materialization; however, ensuring there are no vulnerabilities that can be exploited by threats is the most important action.
Although all options are valid, conducting a vulnerability assessment of enterprise architecture (EA) is most important, since new IT solutions that interface with other IT systems may introduce vulnerabilities in the EA.
A regulatory authority has just introduced a new regulation pertaining to the release of quarterly financial results. The FIRST task that the security officer should perform is to:
A.identify whether current controls are adequate.
B.communicate the new requirement to audit.
C.implement the requirements of the new regulation.
D.conduct a cost-benefit analysis of implementing the control.
A is the correct answer.
Justification
If current security practices and procedures already meet the new regulation, then there is no need to implement new controls.
It is likely that audit is already aware of the new regulation, and this is not the first thing to do.
New controls to comply with the new regulation should only be implemented after determining existing controls do not meet requirements.
A cost-benefit analysis would be useful after determining current controls are not adequate.
Which of the following BEST assists the information security manager in identifying new threats to information security?
A.Performing more frequent reviews of the enterprise’s risk factors
B.Developing more realistic information security risk scenarios
C.Understanding the flow and classification of information used by the enterprise
D.A process to monitor post-incident review reports prepared by IT staff
C is the correct answer.
Justification
Risk factors determine the business impact or frequency of risk and are not related to the identification of threats.
Risk scenarios are not used to identify threats as much as they are used to identify the impact and frequency of threats exploiting vulnerabilities within the information security architecture.
Understanding the business objectives of the enterprise and how data are to be used by the business assists management in assessing whether an information security event should be considered a new information security threat.
The analysis of post-incident reviews assists managers in identifying IS threats that have materialized into incidents and does not necessarily assist IT managers in identifying threats that pose a risk to information security.
Which of the following approaches is BEST to address emerging new threats?
A. Updating antivirus software regularly to mitigate potential threats
B. Conducting periodic threat intelligence assessments in diverse areas
C. Focusing on historical data to understand established threat patterns
D. Implementing strict access controls to protect information from threats
B is the correct answer.
Justification
Keeping antivirus software updated is an essential practice to address known threats; however, it does not address emerging threats.
Information security managers need to be aware of the ever-changing threat landscape and how it affects their enterprise. As infrastructure evolves, new threats often arise where least suspected. Regular threat intelligence assessments are essential for an information security manager to identify and understand emerging risk in diverse areas.
Focusing on historical data does not often point to emerging threats.
Implementing access control does not proactively identify emerging threats in diverse areas.
Addressing risk scenarios at various information system life cycle stages is PRIMARILY a function of:
A.change management.
B.release management.
C.incident management.
D.configuration management.
A is the correct answer.
Justification
Change management is the overall process to assess and control risk scenarios introduced by changes.
Release management is the process to manage risk scenarios of production system deployment, and it is a component of change management.
Incident management addresses impacts when or after they occur.
Configuration management is the specific process to manage risk scenarios associated with systems configuration, and it is a component of change management.
Which of the following internal or external influences on an enterprise is the MOST difficult to estimate?
A.Vulnerability posture
B.Compliance requirements
C.Outsourcing expenses
D.Threat landscape
D is the correct answer.
Justification
The vulnerability posture of an enterprise can be estimated with a high degree of accuracy through systematic, iterative review of systems, data flows, people and processes.
Compliance requirements may be ambiguous at first, but as requirements are reviewed and narrowed, their influence on an enterprise becomes more predictable until the requirements change or expand over time.
The long-term costs of outsourcing are difficult to predict, but the cost is generally clear for defined periods of time (e.g., contract periods). In contrast, the threat landscape is always difficult to estimate.
Threats originate from independent sources that may be natural or human-directed. Neither can be positively predicted in all cases. Human-directed threats in particular are extremely difficult to estimate in an information security context because very small numbers of threat actors (including individuals with no assistance) may be ready and able to initiate threat events for any reason at all, including reasons that are not sensible to the individual or an impartial observer.
The acquisition of new IT systems that are critical to an enterprise’s core business can create significant risk. To effectively manage the risk, the information security manager should FIRST:
A.ensure that the IT manager accepts the risk of the technology choices.
B.require the approval of auditors prior to deployment.
C.obtain senior management approval for IT purchases.
D.ensure that appropriate procurement processes are employed.
D is the correct answer.
Justification
Acceptance of identified risk associated with particular technologies is the responsibility of the business process owner, and possibly of senior management, but it would happen after the risk was identified during the procurement process.
Auditors may identify risk but are not responsible for managing it.
Senior management will typically be involved in IT acquisitions only from a budgetary perspective.
Appropriate procurement processes will include processes to initially identify the risk that may be introduced by the new system.
Which of the following is a PRIMARY source of account breaches related to the use of blockchain technology?
A. Tampering with account entries in databases
B. Poor application programming interface (API) key management
C. Replay attack corrupting the ledger entries in blockchain
D. Inadequate encryption of transaction data in the blockchain
B is the correct answer.
Justification
Use of cryptographic measures makes tampering unlikely.
An application programming interface (API) has distinct levels of permissions including withdrawal of funds from user accounts and execution of trades using programmable rules. If the API key is not securely managed, the user API can be manipulated by threat actors and breach the blockchain account.
Validation of read/write transaction sets make a replay attack unlikely.
Inadequate encryption could potentially lead to breaches, as transaction data could be readable and accessible. Despite this shortcoming, inadequate encryption is not typically the primary source of account breaches in blockchain technology, as it commonly uses strong encryption methods.
Which of the following choices would be the MOST useful in determining the possible consequences of a major compromise?
A.Risk assessment
B.Asset valuation
C.Penetration testing
D.Architectural review
B is the correct answer.
Justification
A comprehensive risk assessment requires an assessment of probability and potential consequences, so it goes beyond what is required.
Asset valuation provides a cost representation of what the enterprise stands to lose in the event of a major compromise.
Penetration tests indicate vulnerability rather than the value of what may be affected if a vulnerability is exploited.
Architectural review may indicate vulnerability, but like penetration testing, it will not reveal the value of what may be affected if a vulnerability is exploited.
Which of the following would be the FIRST step in effectively integrating risk management into business processes?
A.Workflow analysis
B.Business impact analysis
C.Threat and vulnerability assessment
D.Analysis of the governance structure
A is the correct answer.
Justification
Analyzing the workflow will be essential to understanding process vulnerabilities and where risk may exist in integrating risk management into business processes.
A business impact analysis will be important once the workflow and processes are understood in order to understand unit inputs, outputs and dependencies and the potential consequences of compromise.
Threat and vulnerability assessments are properly conducted after the relationship between risk management and business processes has been determined through workflow analysis.
The governance structure may be one of the vulnerabilities that poses a potential risk but it should be analyzed after the workflow analysis. Ideally, the governance structure should reflect the workflow.
Attackers who exploit cross-site scripting vulnerabilities take advantage of:
A.a lack of proper input validation controls.
B.weak authentication controls in the web application layer.
C.flawed cryptographic Secure Sockets Layer implementations and short key lengths.
D.implicit web application trust relationships.
A is the correct answer.
Justification
Cross-site scripting attacks inject malformed input.
Attackers who exploit weak application authentication controls can gain unauthorized access to applications, but this has little to do with cross-site scripting vulnerabilities.
Attackers who exploit flawed cryptographic Secure Sockets Layer implementations and short key lengths can sniff network traffic and crack keys to gain unauthorized access to information. This has little to do with cross-site scripting vulnerabilities.
Web application trust relationships do not relate directly to the attack.
When a major vulnerability in the security of a critical web server is discovered, immediate notification should be made to the:
A.system owner to take corrective action.
B.incident response team to investigate.
C.data owners to mitigate damage.
D.development team to remediate.
A is the correct answer.
Justification
In order to correct the vulnerabilities, the system owner needs to be notified quickly before an incident can take place.
Sending the incident response team to investigate is not correct because the incident has not taken place and notification could delay implementation of the fix data owners authorize to mitigate damage.
Data owners would be notified only if the vulnerability could have compromised data.
The development team may be called upon by the system owner to resolve the vulnerability.
Vulnerabilities discovered during an assessment should be:
A.handled as a risk, even though there is no threat.
B.prioritized for remediation solely based on impact.
C.a basis for analyzing the effectiveness of controls.
D.evaluated for threat, impact and cost of mitigation
D is the correct answer.
Justification
Vulnerabilities may not be exposed to potential threats. Also, there may be no threat or possibly little or no impact even if they are exploited. While threats are always evolving, without additional information, the appropriate treatment cannot be determined.
Vulnerabilities should be prioritized for remediation based on probability of compromise (which is affected by the level of exposure), impact and cost of remediation.
Vulnerabilities discovered will to some extent show whether existing controls are in place to address a potential risk but that does not indicate the control effectiveness.
Vulnerabilities uncovered should be evaluated and prioritized based on whether there is a credible threat, the impact if the vulnerability is exploited, and the cost of mitigation. If there is a potential threat but little or no impact if the vulnerability is exploited, the risk is less and may not require controls to address it.