Risk Management Flashcards
(118 cards)
Looking to define threats specific to your infrastructure
Threat Assessment
Security Control Function
Recognized an actors threat
Detective
Security Control Function
Mitigates the impact of manifested threat
Corrective
CIA
Confidentiality
Integrity
Availability
Organizing Data
-Limited to authorized viewing as agreed on by the parties involved
Confidential Data
Differential Backup
Everyday you’d make a backup of any changes since the full backup - to do a full system recovery you’d need the original backup plus the last differential backup made
Outside company checks your vulnerabilities by trying to get in but not doing anything harmful
Penetration(Pen) Testing
Security Policies
-Define the importance or nature of the data
Data Sensitivity and Classification Policy
Control actions towards IT security
- laws
- policies
- guidelines
- best practices
Administrative Controls
Security Control Function
Deters the actor from attempting the threat
Deterrent
ARO
Annualized Rate of Occurence
Data User Roles
-Set policy on data and incident response actions
Executive User
Control Actions IT systems make toward IT Security
- computer stuff
- firewalls
- password links
- authentication
- encryptions
Technical Controls
Role Based Data Controls
-Read only access but can look at all business data
Executive User
Threats x Vulnerability
Risk
Risk Response - offload some of the impact to 3rd party
Risk transference
In-house document of how they store data
Privacy Threshold Assessment (PTA)
Security Policies
-Defines what a person can or can not do when using company assets
Acceptable Use Policy
Use a variety of physical, administrative, and technical controls to have good…
Defense in Depth
Data User Roles
-Complete control over data and could delete everything - sets permissions
System Administrator
Structural threat
Physical system failure
Defense in Depth
-different types of controls
Diversity
Organizing Data
-Health Insurance Portability and Accounting Act
HIPAA
Private Health Information (PHI)
3 Security Controls
Administrative/Techincal/Physical