• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back

Balance score card

- financial (shareholders)


- customer


- internal (processes)


- growth (improvement)

What is the Business continuity process?

- business as usual


- disaster recovery


- incident handling


- alternate business processes


- business restoration


- business resumption


what are the components Incident management process?

-Identify


-respond


-recovery


-review

Waterfall model

- analyze, design, develop, test, deploy



- high cost of change



- high risk of making too many features or making the wrong thing the right way

What is risk appetite ?

willingness to accept the risk with a potential gain

Portfolio mgmt vs project mgmt

- portfolio is strategic, project is tactical



- portfolio is aggregate, project is specific

What is information security?

it is the measures taken to protect information of unauthorised disclosure , modification or distruction (CIA Triad). and it is a subset of information assurance


includes physical and IT security

what is information systems security?

-it is composed of compusec and commsec
compusec is computer security (CIA TRIAD)



-commsec is measures used to secure data while it gets transfered by means of encryption.

What is administrative security?

-subset of information security


-achieved by administrative rules and infosec policies


-reporting , incident handeling , disposal .. etc


what is (IA) information assurance ?

-it is the super-set of information security


-CIA + authentication and non repudiation


-non- repudiation is the proof of deliver to the sender (ack)

Threat vectors

-natural (disasters , floods , hurricans ......etc)


non-intentional (poorly trained employees)


intentional (internal attacks or external attack)

what is risk?

it is an undesirable circumstance that has both a likelihood of occurrence and negative impact

What is Risk management ?


it is the measures taken to manage risks . and minimize or eliminate their impact

What is residual risk ?


it is the risk remaining after all know risks habe been treated

what is risk transference ?

Transferring risk and its consequences to a third party

what are the types of risk estimation and how to estimate risks?

-quantitative


ALE = SLE x ARO


SLE = AV xEF



ALE - annual loss expectancy


SLE - single loss expectancy


ARO - Annual rate of occurrence


AV = asset value


EF = Exposure Value - percentage loss due threat occurrence



-Qualitative


(estimate the likelihood of occurrence and how major is the impact)

What are the types of risks according to COSO?

-strategic - affects companies mission or goals


-tactic - affecting companies tactics


-operation - affects the efficient use of resources


-reporting - in accurate reporting


-compliance - comply with the laws and regulations


What is the risk assessment process?

- context establishment


-Identify (assets , threat sources , vulnerabilities ...etc.)


-Risk estimation (quantitative and qualitative)


-Risk evaluate (compare risk with a criteria)


-decide whether the assessment in satisfactory



what is proactive risk management process?

proactive means that you treat risks before they arise


-Identify


-Analyze


-plan


-track


-control



What is risk management

-establish the context


-identify


-analyze


-evaluate


-treat

What do you know about IT governance ?


-actions taken to insure efficient and effective use of IT resources to achieve the company's goals


- COBIT 5 is an internationally accepted IT governance

What is agility?

Agility is the ability to create and respond to changes in a turbulent business environment

What is agile manifesto?

- individuals&interactions


- working software


- customer relations


- earning&growth

What is IT management Building blocks?

-strategic (establish company and market)


-tactical (service development )


-operational (service delivery)


-physical(ICT infrastructure)

what is IT service delivery processes ?


-service level management


-capacity management


-financial mgmt


-availability mgmt


-IT service continuity


-change mgmt

what are IT service support processes ?

-incident mgmt


-problem mgmt


-configuration mgmt


-change mgmt


-release mgmt

Compare ITIL V2 and V3

Replaced IT service process with IT service lifecycle

Compare ITIL V3 to ITIL 2011

Added


-IT strategy mgmt


-Business Relationship mgmt

IT service life-cycle components

-Service strategy (determine the needs and objectives)


-service design (mechanisms to meet customer requirements)


-service transition


-service operation


-continuous service improvement (CSI)

Compare risks in waterfall and iterative software design models.


the waterfall model : all the requirements need to be known from the beginning - risk of changing



the iterative model : risk of not finishing on time and increasing the cost

cost of change in waterfall and iterative method?

the cost of change will affect the waterfall model more that the iterative model. as all of the requirments must be known from that start .. it cannot be changes after that. however in the iterative model .. the change can be implemented in the next iteration.

why is there a lot of wasted features in a software developed according to the waterfall model.

- requirements are fixed from the beginning.


- it is hard to add features after that due to the high cost of change

Secure software design life cycle

-requirements and use cases


-design


-test the design


-code


-test the results


-field feedback

what evil user stories ?

- use cases that help secure software developers establish security requirements


explain the difference between strategy and tactics

-strategy has a broad scope, tactics are specific


-strategy occurs prior to actions, tactical occur during actions


-strategy organize resources and tactics employ them

what is risk in cyber security?

it is an undesirable circumstance that has both likelihood of occurrence and negative consequence.