midterm rand Flashcards

1
Q

What was the effect of employee training on breach costs?

A

Organizations with high levels of employee training had breach costs USD 950,000 lower than those with low training levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What factor led to the biggest cost savings in preventing data breaches?

A

Extensive use of AI and automation in prevention, saving an average of USD 2.2 million.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much lower were breach costs when AI and automation were used in detection, investigation, and response?

A

Between 33-43% lower compared to organizations that didn’t use AI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of data breach was the most expensive?

A

Breaches involving public cloud data, costing USD 5.17 million on average.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of stored data took the longest to contain?

A

Public cloud data breaches, taking 23.3% longer than on-premises breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the definition of risk?

A

The effect of uncertainty on objectives​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk management?

A

Coordinated activities to direct and control an organization regarding risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three main components of risk?

A

Threat, vulnerability, and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat?

A

A potential cause of an unwanted incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is vulnerability?

A

A weakness that can be exploited by a threat​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is impact in risk management?

A

The consequences of an event affecting objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps in risk management?

A

Identify, assess, evaluate, treat, monitor, and review​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk avoidance?

A

A strategy to eliminate the risk by not engaging in the activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk reduction?

A

Taking actions to minimize the likelihood or impact of a risk​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk transfer?

A

Shifting the risk to a third party (e.g., insurance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ISO 31000 focus on?

A

Risk management principles, framework, and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk acceptance?

A

A decision to take no action and accept the potential consequences​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does ISO/IEC 27005 focus on?

A

Information security risk management​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the NIST Risk Management Framework (SP 800-37)?

A

A structured process integrating security and privacy risk management

19
Q

What is a control in risk management?

A

A measure taken to reduce risk

20
Q

What is qualitative risk analysis?

A

A subjective assessment of risk impact and likelihood

20
Q

What is inherent risk?

A

The risk level before any mitigation measures

21
Q

What is residual risk?

A

The remaining risk after risk treatment measures are applied

22
Q

What is risk aggregation?

A

The process of combining multiple risks for a holistic view​

23
What is quantitative risk analysis?
A numerical approach to assessing risk
24
What is an advanced persistent threat (APT)?
A prolonged cyberattack by a well-funded group​
25
What is the MITRE ATT&CK framework?
A knowledge base of cyber adversary tactics and techniques
26
What is an intrusion detection system (IDS)?
A system that monitors for malicious activity or policy violations
27
What is an intrusion prevention system (IPS)?
A system that actively blocks detected threats​
28
What is the principle of least privilege (PoLP)?
Giving users only the access they need to perform their jobs
29
What is the difference between black-box and white-box testing?
Black-box: No internal knowledge. White-box: Full knowledge of system​
30
What is the NIST Cybersecurity Framework (CSF)?
A framework providing guidelines for managing cybersecurity risk
31
What are some common risk management standards?
ISO 31000, ISO/IEC 27005, NIST SP 800-39
32
What is residual risk?
The remaining risk after implementing risk treatment measures
33
What is a risk register?
A document listing identified risks, their severity, and mitigation strategies
34
What is the difference between qualitative and quantitative risk analysis?
Qualitative is subjective, while quantitative assigns numerical values
35
What does the NIS Directive define as risk?
Any reasonably identifiable event with a potential adverse effect on information systems​
36
What is an example of a sector-specific risk management standard?
ISO 14971 for medical devices
37
What is the Common Criteria (CC) framework used for?
Evaluating the security of ICT products​
38
What is the EBIOS method?
A French risk assessment methodology
39
What is the BowTie method?
A widely used qualitative risk analysis model
40
What is ISO 31000 known for?
Risk management principles and guidelines
41
What are ICT products?
ICT (Information and Communication Technology) products include hardware, software, and services used for communication, data processing, and information management
42
Why are ICT products important in risk management?
They are essential for securing digital infrastructure, protecting data, and ensuring business continuity​
43
Can you give examples of ICT products?
/Hardware: Computers, servers, networking devices, IoT devices /Software: Operating systems, cybersecurity tools, cloud platforms /Services: Cloud computing, cybersecurity solutions, data storage services