Study This Flashcards
(328 cards)
If risks were categorized as either critical or normal, what risk assessment method is being used?
Qualitative
What risk assessment method produces number results
Quantitative
What document is intended to help deal with potential issues and conflict among partners
BPA
Business partner agreement addresses things like ownership, profits, losses and partner contributions
What does a more threat centered security program look like?
Focusing on understanding adversaries motivations and capabilities
What is characterized as an attempt to gain access to a systems resource
Exploit
What document defines the technical security requirements associated with two orgs and who are connecting their information systems /network?
Interconnection security agreement, ISA
When do we normally build a risk matrix
Qualitative risk analysis
A developer composes a document that details all the entry points through which an attacker could attempt to introduce code into the app environment, what does this document represent
Attack surface
Single loss expectancy equals (=) assets values times (x) exposure factor
The percentage of an asset that is lost due to a threat event
What is the minimum and customary practice of responsible protection of information assets is defined by which of the following terms?
Due care
Of two people are working together and we are concerned about collusion, what is performed?
Rotation of duties
What is a central characteristic of accountability
A systems ability to determine the actions and behavior a single individual within a system
What is the opposite of the CIA triad
Disclosure, alteration and destruction
Report assessing design, suitability and effectiveness for a service organization security controls over a period of time
SOC 2 type 2
What term is primarily concerned with enumerating an understanding the various ways an adversary might negatively impact the security of an application slated for development
Threat modeling
Policies standers guidelines in security awareness training fall under which of the following control categories
Directive controls
What principal Requires multiple individuals authorization in order to carry out a particularly critical function
Separation of duties
Security incident can be thought of in which of the following terms?
Confidentiality, integrity and availability
Which of the following terms describes the right to protect the expression of ideas
Copyright
When calculating the cost of risk I need to look for two factors which of the following choices one of these factors
Single loss expectancy
Your organization just discovered an incident in which PII looks to have been accessed But not ex filtrated. What should you do
Disclosure within 72 hours of the incident discovery
What document would be used to ensure that the IT department meeting is contractual obligations with the audit team
Ola
Operating level agreement which is an internal agreement that supports the SLA
And quantitative risk management single loss expectancy is used to quantify what
The amount of financial impact that would result if a breach occurred that impacted an asset
Prior to excepting a risk what has most likely occurred
Risk mitigation
There will always be a residual risk even if mitigating counter measures are leveraged. Either this occurs explicitly and formally or risk is accepted implicitly by choosing not to employ additional avoidance, transfer, or mitigation measures