Risk Flashcards

1
Q

The lack of the countermeasure or a weakness that is in place

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any potential danger that is associated with the exploitation of the vulnerability

A

a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The likelihood of a threat agent exploiting a vulnerability in the corresponding business impact

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An instance of being exposed to loss

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Also known as the countermeasure it is put into place to mitigate or reduce the potential risk

A

a control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls are put into place reduce the risk of an organization faces and they come in three main flavors:

A

Administrative, technical and physical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

We know that the different categories of controls to be used are administrative technical and physical.
But what do these controls actually do? The different functionalities of security controls are (6):

A
Deterrent 
preventative 
corrective 
recovery 
detected 
compensating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a group of standards called that serves as industry best practices for the management of security controls in a holistic manner within organizations around the world

A

ISO/IEC 27000 series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 4 examples of enterprise architecture development a.k.a. frameworks

A

Zachman framework, TOGAF, DoDAF, MODAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two standards under the security controls development

A

CobiT (objectives fir IT Mgmt dev by ISACA & ITGI)

SP 800-53 -NISt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two models for process management

A

Six Sigma, CMMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk = T * V

A

risk = threat x vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SLE = AV * EF

A

single loss expectancy = asset value * exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALE = SLE * ARO

A

Ale $ = SLE $ x ARO %

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO= #/ yr.

A

annualized rate of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Delphi Technique

A

anonymous survey to gain uninfluenced responses for consensus. (qualitative analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CobiT framework.Goal: define controls that should be used to properly manage IT & ensure it maps to business needs. Name the 4 domains:

A

4 Domains:Plan and OrganizeAcquire and ImplementDeliver and Support Monitor and EvaluateIt’s a chklist approach to guide companies when they buy, install, test, certify and accredit IT products

13
Q

which NISt publication outlines controls agencies. need to put into place to be FISMA complaint ?

A

NIST 800-53

14
Q

Name 3 categories if control outlined by NIST:

15
Q

COSO is model for corporate governance while CobiT is a model for IT governance. What are the 5 components of COSO:

A

Control EnviroRisk AssessmentControl ActivitiesInfo & CommMonitoring

16
Q

what’s the difference between a risk assessment and a vulnerability assessment

A

Vulnerability assessment find the holes. A risk assessment calculates the probability of the vulnerabilities being exploited and the associated business impact

17
Q

What is Delphi technique

A

Adelphi technique is a group decision method to ensure that each member gets an honest opinion of what here she thinks result of a particular threat will be

18
Q

Residual risk is the risk leftover to deal with after countermeasures have been sent. What is the formula for residual risk?

A

{Threats x vulnerability x asset value = total risk} x control gap = residual risk

19
Q

Total risk is risk a company faces if it is not going to implement any type of safeguard!! what is the formula for total risk

A

Threats x vulnerability x asset value = total risk

20
What are standards
Standards referred to mandatory activities actions or rules. They can give a policy it's support and reinforcement in that direction.
21
What is a baseline
The term baseline refers to a point in time that is used as a comparison for future changes.
23
What is a guideline
Suggestions and best practices
25
What are procedures
Procedures are step-by-step implementation instructions
27
What are the three policy functionality types
Regulatory, advisory, informative.
29
What are common levels of sensitivity for a commercial business
Confidential,. Private, sensitive, public
31
What are the levels of sensitivity for military purposes
Top secret, secrets, confidential, sensitive but unclassified, unclassified
32
It is the users primary responsibility to determine declassification level for information. However who is ultimately responsibile to make sure data is classified and protected
mgmt
33
True or false: if different user groups with different security access levels need to access the same info, Management should increase the security controls on the information.
True. It is going to be available to a wide range of people so more granular security should be implemented to ensure that only the necessary people access the data
34
True or faults: management should consider the availability integrity and confidentiality when classifying data
True
35
Security functionality defines the expected activities of a security mechanism. What does assurance define?
Assurance defines the confidence of the security mechanism is providing
36
Review the proper mapping for the ISO/IEC standards:
ISO/IEC:27001 = ISMS27002= code of prac for infosec mgmt27003= guideline for isms imp27004=metrics27005= infosec risk mgmt27006=audit & cert
37
What best describes a control to be used in order to carry out fraudulent investigation activities
Mandatory vacation is an administrative detective control that allows for an organization to investigate an employees daily business activities to uncover any potential profit maybe taking place
38
What is the relation between COSO and CobiT frameworks
Coso deals more at a strategic level, well CobiT focuses more at the operational level. CobiT is a way to meet many of the COSO objectives but only from the IT perspective. COSO deals with non-IT items. It's main purpose is to help ensure fraudulent financial reporting cannot take place in an organization
39
Looking at risk stds, What's the difference between NIST 800-30, octave, and AS/NZS 4360?
Nist 800 – 30 risk management guide for IT systems is focused on IT risks. Octave is a methodology to set up a risk management program within an organizational structure. AS/NZS takes a much broader approach to risk management, it's mythology can be used to understand the company's financial, capital, human safety and business decision risks.
40
Single sign-on tech: what is an application protocol that uses a KDC & tickets and is based on some Symmetric key crypto
Kerberos
41
Single sign-on tech: What authentication protocol is simolar to kerberos, uses a PAS and PACs and is based on symmetric and asymmetric Krypto
Sesame (Secure European system for applications and a multi vendor environment)