L10 - Risk Analysis and Information Security Strategy Flashcards

1
Q

What is risk management?

A

The main goal is to develop and implement information security strategies, which in turn reduce the risk to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is risk analysis?

A

The process by which the goals of risk management are acheived.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does risk analysis work?

A

It:
* Examines an environment for risks
* evaluate how likely a threat event is to occur
* evaluate the cost to assets if the thread were to occur
* assessing the cost of various countermeasures for each risk
* Create a cost/benefit report for safeguard to present to management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk terminology

What is an asset?

A

It’s a system resource or cability of value to it’s owner which should be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk terminology

What is asset valuation?

A

The monetary value of an asset based on the actual cost (e.g replacement cost) and nonmonetary expense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk terminology

What is a threat?

A

a potential threat source to exploit a vulnerability in an asset, in turn if it occurs it may compromise security of said asset and cause its owner harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk terminology

What is vulnerability?

A

A flaw or a weakness in an asset, it could be in it’s design, implementation, operation or management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk terminology

What is exposure?

A

It’s how likely it is that a vulnerability can or will be exploited by a threat agent or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk terminology

What is risk?

A

It’s the potential loss a owner would suffer due to a threat exploiting a vulnerability. And the magnitude this consequence would have on an assets owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk terminology

What is safeguards?

Also called countermeasure

A

is anything that would remove or reduce a vulnerability or protect against one or more specific threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asset identification?

A

An asset is anything that needs protection, to identify such an asset drawing expertise from people in relevant areas of the organization is the way to go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is thread identification?

A

It’s the creation of an exhaustive list of all possible threats, which could be:
* Viruses
* Misuse of data
* malicious hackers
* criminal activities
* disgruntled employees.
* etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is vulnerability identification?

A

It’s the process of identifying exploitable flaws or weaknesses in organizations IT-systems or processes.
It’s outcome should be a list of threats and vulnerabilities of how and why they might occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between qualitative and quantitative risk analysis?

A
  • Quantitative: values from the mathematical domain like the probaility space. It can be performed by assigning monetary values and probabilities to threats and assets.
  • Qualitative: values aren’t from the domain of mathematics, instead risk is calculated based on rules that capute the consolidated advice of security experts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a risk calculated?

A

the risk is calculated based on the monetary value of the asset and the probaility of the likelhood that a threat would occur.

Only applies to quantitative risk analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 5 risk treatment alternatives?

A
  • Risk acceptance
  • Risk avoidance
  • Risk tranfer
  • Reduce consequence
  • Reduce likelyhood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk treatment alternatives

What is risk acceptance?

A

Chosing to accept a risk level greater than normal for business reasons.

18
Q

Risk treatment alternatives

What is risk avoidance?

A

Not proceeding with the activity or system that creates a specific risk.

19
Q

Risk treatment alternatives

What is risk transfer?

A

Sharing a responsibility for the risk with a 3rd party.

20
Q

Risk treatment alternatives

What is reduce consequence?

A

Altering the structure or the use of the asset at risk in order to reduce the impact on the organization should that risk occur.

21
Q

Risk treatment alternatives

What is reduce likelyhood?

A

Implement suitable controls to lower the change of the vulnerability being exploited.

22
Q

What is an attack surface?

A

It’s the reachable and exploitable vulnerabilities in a system.

23
Q

What are the 3 attack surface categories?

A
  • Network attack surface
  • Software attack surface
  • Human attack surface
24
Q

Attack surface categories

What is the network attack surface?

A

It’s the vulnerabilities over an enterprise network, wide-are network or the internet.

25
Q

Attack surface categories

What is the software attack surface?

A

It’s the vulnerabilities in application, utility, or operating system code.

26
Q

Attack surface categories

What is the human attack surface?

A

It’s the vulnerabilities created by personell or outsiders, such as social engineering, human error and trusted insiders.

27
Q

What are the 3 control types?

A
  • Physical controls
  • Administrative controls
  • Technical controls
28
Q

The 3 control types

What does the physical control contain?

A
  • Facility protection
  • Security guards
  • Locks
  • Monitoring
  • Environmental controls
  • Intrusion detection
29
Q

The 3 control types

What does the administrative control contain?

A
  • Policies
  • Standards
  • Procedures and practice
  • Personnel screening
  • Awareness training
30
Q

The 3 control types

What does the technical control contain?

A
  • Logical access control
  • Cryptographic controls
  • Security devices
  • User authentication
  • Intrusion detection
  • Forensics
31
Q

What is defense in depth?

also layered security

A

it’s a principle that is characterized by the use of multiple different defense mechanism. With the goal of improving defensive response to an attack.

32
Q

How is defense in depth related to to attack surfaces?

A
  • If the attack surface is large, and the defence is shallow the security risk is hich
  • And the oposite creates a low security risk.
33
Q

What are the 3 common security strategies?

A
  • Preventation
  • Detection
  • Reaction
34
Q

The 3 common security strategies?

What is the prevention strategy?

A

Take measures that prevent your assets from being damaged.

35
Q

The 3 common security strategies?

What is the detection strategy?

A

take measures so that you can detect, when, how and by whom an asset has been damaged.

36
Q

The 3 common security strategies?

What is the reaction strategy?

A

take measures so that you recover your assets or recover from damage to your assets.

37
Q

What are security goals?

A

it’s the goal of preventing unauthorized individuals from interfere with CIA, authenticity and accountability.

38
Q

Security goals

What are suitable controls for C in CIA?

A
  • Encryption
  • Access control
  • Perimeter defense
39
Q

Security goals

What are suitable controls for I in CIA?

A
  • Cryptographis integrity check (hashing)
  • Access control
  • Perimeter defense
  • Audit
  • Verification of systems and applications.
40
Q

Security goals

What are suitable controls for A in CIA?

A
  • Redundancy of resources
  • Traffic filtering
  • Incident recovery
  • International collaboration and policing.
41
Q

What are security control states?

A

Information is considered to be in one of three possible states.
* During storage
* During transmission
* During processing (use)

All states are considered to be in need of protection.