Risk Management Flashcards

1
Q

What is the CIA of Security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which element of the CIA of Security is the goal of keeping data secret from anyone who doesn’t have the need or the right to access that data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which element of CIA of Security ensures the data and systems stays in an unaltered state when being transferred, received?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which element of CIA of Security ensures that systems and data are available to users when needed?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the act of keeping track of things that on such as who has been logging in, who has made changes to something, etc?

A

Auditing and Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user can’t deny that they have performed a particular action

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the people and organizations that actually do the attacks called?

A

Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which threat actor is known for trivial attacks due to lack of knowledge?

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which threat actor is motivated by intent to make a public social statement?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the motivation of Nation states and advanced persistent threat (APT) threat actors?

A

Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is someone inside the company that has information to gain access that can be used as an attack?

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the potential to harm organizations, people, IT equipment, etc.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides benefits to the organizations; equipment or people

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Weakness that allows an asset to be exploited

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A discovered action that exploits a vulnerability’s potential to do harm to an asset

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What defines the level of certainty that something is going to happen?

A

Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the actual harm caused by a threat?

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an outside party looks for vulnerabilities and reports it

A

Penetration (pen) testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

effort to reduce impact of a risk

A

mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

offload some of the likelihood and risk on a third party

A

risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

reach a point where the likelihood and impact is so high that i simply don’t want to do deal with it

A

risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the workflow or methodology process that helps security professionals deal with risk management?

A

Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are two examples of a Risk management framework

A

NIST Risk Management Framework, ISACA Risk IT Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the threshold value to verify expected throughput or action?

A

Benchmark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
manufacturers' security guides to setup and review configurations
platform or security guide
26
What is a general purpose guide in terms of risk assessment?
a list of security controls
27
What are the three types of security controls?
Administrative (management), Technical, Physical
28
What are some examples of Administrative security control?
laws, policies, guidelines, best practices
29
What are some examples of Technical security control?
computer stuff, firewalls, password links, authentication, encryption
30
What are some examples of Physical security control?
gates, guards, keys, man traps
31
In terms of security control functions, what is a deterrent?
deters the actor from attempting the threat
32
In terms of security control functions, what is a preventative?
deters the actor from performing the threat
33
In terms of security control functions, what is a detective?
recognizes an actor's threat
34
In terms of security control functions, what is a corrective
mitigates the impact of a manifested threat
35
In terms of security control functions, what is compensating?
provides alternative (usually temporary) fix
36
How is mandatory vacation used a security control
requires individuals to take vacation; used to detect fraud and unauthorized activity
37
how is job rotation used as a security control
periodically switching jobs prevents fraud and unauthorized activity
38
How is multi-person control used as a security control
more than one person is required to do a job; allows for checks and balances of critical functions
39
How is separation of duties used as a security control?
one person is not allowed to perform all duties. this is to prevent unauthorized activity
40
users are only granted the privilege needed to perform their job (need to know) This prevents unauthorized access to information
principle of least privileged
41
In terms of defense, repeating the same controls at various intervals
redundancy
42
In terms of defense , use of variety of controls in a random pattern
diversity
43
What are the types of sources for IT Security Governance?
Laws and regulations, standards, best practices, common sense
44
defines how we are going to be doing something; broad in nature, used as directives, defines roles and responsibilities
Governance policy
45
What defines what a person can or cannot do on company assets?
Acceptable use Policy
46
Which policies defines how to get access to data or resources and what type of data users have access to?
Access Control Policies
47
Which policy defines how you deal with passwords, password recovery, bad login, retention, reuse, etc.
Password policy
48
Which policy defines how to maintain company equipment?
Care and Use of Equipment
49
What policy defines how your data or data usage will be shared with other resources?
Privacy policies
50
Which policy defines the people that are dealing with our data
Personnel Polices
51
What are the sources that frameworks come from?
regulatory, non-regulatory, national standards, international standards, industry-specific frameworks
52
What is the first go-to for IT security professionals who want to be able to understand to perform a risk management framework?
NIST SP800-37
53
What are the NIST risk management steps?
Categorize, Select, Implement, Assess, Authorization, Monitor
54
What is asset value?
the value of an asset + the cost of fixing the asset
55
What is exposure value?
percentage of an asset that is lost as a result of an incident
56
What is the formula for Single Loss Expectancy?
Asset Value * Exposure Factor
57
What is annualized Rate of occurrence (ARO)?
in a given year, what are the chances of this particular instance taking place
58
What is the formula for Annualized Loss Expectancy (ALE)?
Single Loss Expectancy (SLE) * Annualized rate of occurrence (ARO)
59
What is mean time to repair?
time it takes to repair
60
What is mean time to failure?
time it takes to fail (how long is it working)
61
What is the mean time between the two failures?
The time in between two failures (MTTR+MTTF)
62
What estimates the cost of loss of personal privacy or proprietary data?
Privacy Impact Assessment (PIA)
63
What is the min time necessary to restore a critical system to operation?
Recovery Time Object (RTO)
64
What is the max data that can be lost without substantial impact?
Recovery Point Object (RPO)
65
What allows recipients of the data to know if or how the data can be shared?
Data sensitivity/labeling
66
What is the owner in terms of data roles?
legally responsible for the data
67
What is the steward/custodian in terms of data roles?
maintain the accuracy and integrity of data
68
What is the privacy officer in terms of data roles?
ensures data adheres to privacy policies and procedures
69
Which Data (user) role is assigned standard permissions to complete task?
User
70
Which Data (user) role has increased access and control relative to a user?
Privileged user
71
Which Data (user) role sets policies on data and incident response actions?
Executive user
72
Which Data (user) role has complete control over the data or system?
System administrator
73
Which Data (user) role has legal ownership and responsibility of data or system?
data owner/system owner
74
Manufacturer and vendor guides provide what?
Setup suggestions
75
a self-directed combination of administrative, physical, and technical controls is an example of..
defense in depth
76
What describes the set of overarching rules that defines how an organization and its employees conduct themselves?
Governance