(1)Evaluating Security Risks Flashcards

1
Q

What is so important about Cybersecurity Risk Analysis? What do analysts have to do in this arena?

A

Cybersecurity risk analysis is one of the most if not the most important part of the information security program.

Analysts have to have a complete understanding of their tech environment and the outside dangers that put their system in harms way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a well constructed cyber security program include?

A

A well constructed cyber security program includes information about inside and outside details to assist analysts to understand the threats their org faces and then make a group of controls to handle those threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are three terms that a risk analyst needs to know?

A

Vulnerability, Threat, and Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability?

A

A vulnerability is when an attribute in a device, system, process, or application could possibly allow an attack to happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat?

A

A threat is an outside factor that could take advantage of a vulnerability

Example) If a bad actor knows that the security team is lighter staffed on certain days and doesn’t cover all areas of a data center may try to infiltrate the data center to cause problems for the org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When it comes to threats, are all threats malicious?

A

Not all threats are malicious. While a vulnerability in a server system that a hacker could exploit is a threat, some threats are not malicious, such as earthquakes as they aren’t initiated by a person with the exclusive purpose of destroying a datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a risk?

A

A risk is a threat and vulnerability put together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must be true for an item to be a risk?

A

Both a threat and vulnerability must be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the risk equation?

A

The risk equation is Risk = Threat x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the risk equation, if a threat or vulnerability is zero, what is true?

A

If a threat or vulnerability is zero, then the risk is also zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the NIST publication that is a guide for risk assessments?

A

The NIST publication for risk assessments is NIST Special Publication (SP) 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly