Lecture 2 Flashcards

1
Q

What is the relationship between risk and security controls?

A

The amount of risk drives reasons to invest in security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the practical sense, what are security controls?

A

Knowing vulnerabilities and mitigating them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vulnerability Management?

A

The Practice of:
1. Knowing known vulnerabilites in an environment
2. Mitigating them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A vulnerability assessment is a set of… what?

A

A set of activities used to identify security weaknesses in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps in the Vulnerability Management Life Cycle (4)?

A
  • Collect Data
  • Analyze Data
  • Make Recommendations
  • Implement Recommendations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Regulatory compliance
  • Satisfying customer demands
  • Response to some fraud/incident

Within the context of our course, what are these?

A

Business drivers for vulnerability management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Gaining a competitive edge
  • Safeguarding/protecting critical infrastructures

Within the context of our course, what are these?

A

Business drivers for vulnerability management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Canada’s Information Technology Security Guidance Publication 33 (ITSG-33)
  • Health Insurance Portability and Accountability Act (HIPAA)

Your organization deals with these regulatory standards/frameworks, what must you also do?

A

Perform vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Personal Health Information Protection Act (PHIPA)
  • Personal Information Protection and Electronic Documents Act (PIPEDA)
  • ISO 27001
  • NIST

Your organization deals wit these regulatory standards/frameworks, what must you also do?

A

Perform vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly