Lo3 Flashcards
What are the steps to cyber-security risk management?
Identify the risks.
Measure the risk and how serious and how likely is that you might get attacked.
Monitor and report the risks.
Control the risks
Adjust the risk management process.
What are the 4 assets in the computer system and networks?
Hardware resources
Software resources
Communication equipment
Information and data
Give 3 examples of hardware assets
Hardware resources - computer ,servers ,printers ,scanners
Give 3 examples examples of software assets
Software resources - Word processor ,databases ,spreadsheets bespoke software
Give 3 examples of communication assets
Communication Resources - Hubs ,routers ,bridges ,gateways ,modems
Give 3 examples of information and data assets
Information and data resources - Customer data, employee data, financial reports
What is done after a vulnerability is identified?
Risks are placed on a scale from critical impact(High priority) to low impact(Low priority)
Define remediation
Remediation is the way vulnerabilities are dealt with
State the 3 steps in remediation
Patch Development
Manual
Automated Tools
What is Patch Development in remediation?
Where software code is written to solve a software issue
What is Manual in remediation?
This is where physical steps are taken to reduce the vulnerabilities by IT technicians
What is Automated Tools in remediation?
Tools that can Identify and fix any problems without the need for human intervention
What are Biometrics?
A tool that can identify individuals using their biological characteristics
Give 3 examples of Biometrics
Finger print, face recognition, voice id, retina scan etc
What are assets?
Anything with a value owned by an individual or organization