Security Domain Flashcards

1
Q

What are the two primary purposes of the Health Insurance Portability and Accountability Act (HIPPA)?

A

Security and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What exists to alleviate the risk of certain threats by providing monetary compensation in the event those threats occur?

A

Insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the acronym SLE denote?

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which element of the CIA triad ensures that transferred data is not altered in transmission?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Of which control is enforcing mandatory vacation an example?

A

Administrative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What the purpose of a preventative control?

A

To prevent security incidents before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of control is required for detecting occurrences of risks?

A

Detective Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which organization has developed an ethics-related statement concerning the use of the Internet?

A

Internet Architecture Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for the process of identifying information assets and their associated threats, vulnerabilities, and potential risks?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which formula should you use to determine the Single Loss Expectancy (SLE) of an asset

A

Asset Value (AV) * Exposure Factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who should oversee the development of the information security policy?

A

An organization’s business operations manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which term refers to the processes and procedures that are followed to minimize the problems affecting the information systems?

A

Problem Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by the term enrollment time in a biometric system? pg 571

A

the time it takes to register the system by providing samples of a biometric characteristic (biometric factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Third-Party governance?

A

It is a system of oversight that may be mandated by law, regulation, industry standard, contractual obligation, or licensing requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Third-party governance focus on?

A

verifying compliance with stated security objectives, requirements, and regulations, and contractual obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The possibility that something could happen to damage, destroy, or disclose data or other resources is known as

17
Q

What is the primary goal of risk management?

A

reduce risk to an acceptable level

18
Q

The process by which the goals of risk management are achieved is known as

A

Risk analysis

19
Q

Prioritizing and comparing risk to losses require ___

A

Asset valuation

20
Q

What is the risk formula?

A

= threat * vulnerability

21
Q

What is Qualitative Risk Analysis?

A

is based on scenarios than calculations. Exact dollar figures are not assigned to possible losses; instead threats are ranked on a scale to evaluate their risks, costs, and effects. Such an analysis assists those responsible in creating proper risk management policies.

22
Q

Quantitative Risk Analysis

A

Results in concrete probability percentages.
The end result is a report that has dollar figures for levels of risk, potential loss, cost of countermeasures, and value of safeguards.

23
Q

What are the six steps of the risk management framework? (Figure 2.7 page 80)

A

Categorize, Select, Implement, Assess, Authorize, and Monitor

24
Q

What is the prerequisite to security training?

25
What is the annualized loss expectancy (ALE)
ALE is an element of quantitative risk analysis that represents the possible yearly cost of all instances of a specific realized threat against a specific asset.
26
What is exposure factor?
An element of quantitative risk analysis that represents the cost associated with the single realized risk against a specific asset.
27
What are the elements of risk analysis?
1. Analyzing an environment for risks; 2. Evaluating each threat event as to its likelihood of occurring and the damage it would cause, 3. Assessing the cost of various countermeasures for each risk, and 4. Creating a accost/benefit report for safeguards to present to upper management.
28
How is the value of a safeguard to a company calculated?
ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard [(ALE1-ALE2)-ACS]
29
When evaluating safeguards, what is the rule that should be followed in most cases?
The annual costs of safeguards should not exceed the expected annual cost of asset loss.
30
ALE is calculated using the following formula:
ALE= SLE*ARO
31
What is total risk?
It is the amount of risk an organization would face if no safeguards were implemented.
32
What is the formula for total risk?
threats * vulnerabilities * asset value = total risk
33
What is residual risk?
The risk that management has chosen to accept rather than mitigate.
34
What are control gaps?
The difference between total risk and residual risk, which is the amount of risk that is reduced by implementing safeguards.
35
Residual risk calculation formula:
total risk- control gaps = residual risks.
36
What are 7-types of controls?
``` Compensating Corrective Detective Deterrent Directive Preventive Recovery ```
37
Calculating Annualized Loss Expectancy with a Safeguard requires a new
EF and ARO specific to the safeguard
38
Formula for Safeguard Cost/Benefit
ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard (ACS) = value of the safeguard to the company
39
What are the five elements of Authentication, Authorization, and Accounting (AAA) services?
1. Identification; 2. Authentication; 3. Authorization; 4. Auditing; and 5. Accounting