• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back

Qualitative Risk Assessment - For a given scope of assets, identify (5) things.

(1) Vulnerabilities


(2) Threats


(3) Threat probability (low / medium / high)


(4) Impact (low / medium / high)


(5) Countermeasures

Quantitative Risk Assessment - Metrics for each risk are: (5).

(1) Asset Value


(2) EF


(3) SLE


(4) ARO


(5) ALE

What does EF stand for?

Exposure Factor

What does Exposure Factor refer to?

Portion of asset damaged.

What does SLE stand for?

Single Loss Expectancy

What is the formula for SLE?

SLE = Asset ($) x EF (%)

What does ARO stand for?

Annualized Rate of Occurence

What does ARO refer to?

Probability of loss in a year, %

What does ALE stand for?

Annual Loss Expectancy

What is the formula for ALE?

SLE x ARO

Impact of quantifying countermeasures: (3)

(1) Cost of countermeasure


(2) Changes in EF


(3) Changes in SLE

What does OCTAVE stand for?

Operationally Critical Threat, Asset, and Vulnerability Evaluation.

What does FRAP stand for?

Facilitated Risk Analysis Process

What is FRAP?

A risk assessment methodology that offers qualitative pre-screening.

Name 4 Risk Assessment Methodologies.

(1) NIST 800-30, Risk Management Guide for IT Systems.


(2) OCTAVE


(3) FRAP


(4) Spanning Tree Analysis

What are the 4 outcomes from a risk assessment?

(1) Risk acceptance


(2) Risk avoidance
(3) Risk reduction


(4) Risk transfer

What is Risk Acceptance?

"Yeah, we can live with that."

What is Risk Avoidance?

Discontinue the risk-related activity.

What is Risk Reduction?

Mitigate.

What is Risk Transfer?

Buy insurance.

What does CIA stand for?

Confidentiality, Integrity, Availability.

What is the CIA Triad?

(1) confidentiality - information and functions can be accessed only by properly authorized parties.



(2) integrity - information and functions can be added, altered, or removed only by authorized persons and means.



(3) availability - systems, functions, and data must be available on-demand according to any agreed-upon parameters regarding levels of service.

What does SPOF stand for?

Single Point of Failure

What is a single point of failure?

is a weakness in a system where the failure of a single component results in the failure of the entire system

When a security mechanism fails, there are usually two possible outcomes. What are they?

Fail open, and fail close.

What is "Fail open"?

The mechanism permits all activity.

What is "Fail closed"?

The mechanism blocks all activity.

What is the definition of Privacy?

The protection and proper handing of sensitive personal information.

What are the 9 components of Security Management?

- Executive oversight


- Governance


- Policy, guidelines, standards, and procedures


- Roles and responsibilities


- Service level agreements


- Secure outsourcing


- Data classification and protection


- Certification and accreditation


- Internal audit

What are the 4 components of Security Executive Oversight?

- Support and enforcement of policies


- Allocation of resources


- Prioritization of activities


- Risk treatment

What is the definition of "governance"?

"Security governance is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved ascertaining that risks are managed appropriately and verifying that the enterprise's resources are used responsibly.”


– IT Governance Institute

What are the 5 components for governance?

(1) Steering committee oversight


(2) Resource allocation and prioritization


(3) Status reporting


(4) Strategic decisions


(5) The process and action that supports executive oversight.

What are policies?

Constraints of behaviour on systems and people. Defines what but not how.

What are requirements?

Required characteristics of a system of process.

What are guidelines?

Defines how to support a policy

What are standards?

What products, technical standards, and methods will the used to support policy.

What are procedures?

Step by step instructions.

In terms of Roles and Responsibilities, what are 4 things that need to be defined?

(1) Ownership of assets


(2) Access to assets


(3) Use of assets


(4) Managers responsible for employee behaviour

What does SLA stand for and what does it mean?

Service Level Agreement. SLAs define a formal level of service.

SLAs for security activities include 4 things:

(1) Security incident response


(2) Security alert / advisory delivery


(3) Security investigation


(4) Policy and procedure review

What is certification?

Certification is the process of evaluating a system against a set of formal standards, policies, or specifications.

What is accreditation?

Accreditation is the formal approval for the use of a certified system, for a defined period of time (and possibly other conditions).

What are the 4 components of personnel / staffing security?

(1) Hiring practices and procedures


(2) Periodic performance evaluation


(3) Disciplinary action policy and procedures


(4) Termination procedures

What are 3 work practices for a more secure work environment?

(1) Separation of duties


(2) Job rotation


(3) Mandatory vacations

What is "separation of duties"?

Designing sensitive processes so that two or more persons are required to complete them.

What is "Job rotation"?

Good for cross-training, and also reduces the likelihood that employees will collude for personal gain.

What are "mandatory vacations"?

Used to detect / prevent irregularities that violate policy and practices.

An organization's security program should support it's _______________, _________________, and ______________.

mission, objectives, and goals.

The core principles of information security are _______________, ______________, and _____________.

confidentiality, integrity, availability.

________ is related to the protection and proper handing of personal information.

Privacy.

_________________ ________________ is the set of responsibilities and practices related to the development of strategic direction and risk management.

Security governance.

________ ____________ specify the required characteristics of information systems and required code of conduct of employees.

Security policies

______________________________ define the ownership, access, and use of assets, and the general responsibilities of managers and employees.

Security roles and responsibilities

What is an internal audit?

The activity of evaluating security controls and policies to measure their effectiveness.

And organization's hiring process should include (6) things.

(1) the use of non-disclosure


(2) employment


(3) non-compete


(4) intellectual property


(5) acceptable use agreements


(6) background checks

Sound work practices include _______, _______, and ________.

Separation of duties, job rotation and mandatory vacations.