1: Risk management Flashcards

1
Q

CIA triad

A

Security goals: confidentiality, integrity (permissions) and availability + Auditing&Accountability, Non-Repudiation (user cannot deny communication).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk

A

Threats x Vulnerabilities = risk SP800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Actors

A
(Internal/External):
Script kiddies - amateur
Hacktivist - intent & motivation
Organized crime
Nation states/advanced persistent threat (APT)
Insiders
Competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Assessment

A

List of assets->value->vulnerabilities
cve.mitre.org - common vulnerabilities
Nessus, Penetration testing - vulnerability assessment tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Types

A

Adversarial
Accidental
Structural
Environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Response

A

Mitigation
Risk transference
Risk acceptance
Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Frameworks

A

NIST Risk Management Framework 800-37

ISACA Risk IT Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Guides for Risk Assessment

A
Benchmarks
Thresholds
Secure configurations
Network infrastructure devices - info by CISCO, etc.
General Purpose guides
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Controls

A

(Protect IT infrastructure and remediate problems)
Administrative Control
Technical Control
Physical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Control Functions

A
Deterrent
Preventative
Detective
Corrective
Compensating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Control Examples

A
Mandatory Vacation
Job Rotation
Multižperson Control
Seperation of Duties (Administrative).
Principle of least priviledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sources of Security Controls

A
  • Laws and regulations - for ex. HIPAA
  • Standards (government and industry, PCI-DSS - for credit cards)
  • Best Practices
  • Common Sense
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls

A
  • Policies
    • Organizational Standards - higher level of detail than policies

Procedures - how to
Guidelines (optional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Policies

A

Acceptable Use Policy - what a person can and cannot do on company assets
Data Sensitivity and Classification - confidential, etc.
Access Control Policies - what and how access data, etc.
Password policy
Care and Use of Equipment
Privacy Policies - in house or customers
Personnel policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Framework

A

regulatory, non-regulatory, national standards, international standards, industry-specific. (NIST SP800-37 - regulatory, ISACA IT Infrastructure - non-regulatory, ISO 27000 - international)
NIST: Categorize Systems->Select Security Controls->Implement Security Controls->Asses Security Controls (Sandbox)->Authorize Information Systems->Monitor Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Quantitative Risk Calculations

A

Exposure factor - percentage of an asset that is lost as a result of incident
Asset Value x Exposure Factor =Single Loss Expectancy
ARO - annualized rate of occurence
SLE x ARO =ALE - annualized Loss Expectancy

MTTR - mean time to repair
MTTF - mean time to failure

MTBF - mean time between failures = MTTR + MTTF

17
Q

Business Impact Analysis

A
Determine mission process
Identify critical systems
Single point-of-failure - avoid with redundancy. backups
Identify resource requirements
Identify recovery priorities
18
Q

Business Impact

A

Finance - credit, cash flows and accounts receivable
Property
People - safety and life
Reputation

Privacy Impact Assessment (PIA) - what would the impact be in case of a problem
Privacy Threshold Assessment (PTA) - how we store, consume and transmit the data

RTO - recovery time objective, minimal time to repair a system, maximum time the system can be down without substantial impact
RPO - recovery point objective, maximum amount of data that can be lost without substantial impact

19
Q

Data Types

A

Public - no restrictions
Confidential - Limited to authorized party
Private - personally identifiale information PII, atc.
Proprietary - private at corporate level - proprietary information
Protected Health Information - PHI

20
Q

Data Roles

A

Owner - has legal responsibility
Steward/custodian - maintains the accuracy and integrity of data
Privacy Officer - ensures that data adheres to policies

Data Users:
Users - standard amount of permissions
Priviledged Users - increased access and control to a user (most of the time cannot delete all of the data).
Executive Users - make strategic decision - verifies backups being done, etc. strategic
System Administrator - complete control of system and data. In charge of day to day manipulation.
Data owner/System owner - have legal ownership of dataset or system.

21
Q

Security Training

A

Onboarding (background check, non-disclosure agreement NDA, Standard operating procedures, rules of behavior, general security policies).
Offboarding (disable accounts, return credentials, exit interview, knowledge transfer)

22
Q

PII

A

PII - personally identifiable information - NIST 800-122
full name, home address, email address, NI number, passport, license plate, digital identity, date of birth, drivers license number, face, fingerprint, credit card

23
Q

Role Based Controls

A

Personnel Management Controls - mandatory vacations, 2 weeks. Job rotation. Separation of Duties.

Role-based Data Controls:
System Owner
System Administrator
Data Owner - defines access
User - accesses and uses data, monitors and reports security breaches
Privileged user - has special access
Executive user - read only access
24
Q

Third Party Agreements

A

BPA - business partnership agreement (primary entities, time frame, financial issues, management,)
SLA - service level agreement, service provided, minimum up-time, response time and contacts, start and end date
ISA - interconnection security agreement - statement of requirements, system security considerations, topological drawing, Signature authority (time frame for interconnection and scheduling for reviews). Technical document.
MOU/ MOA - Memorandum of Understanding/Agreement - purpose of interconnection, authorities, responsibilities of both organizations, terms of the agreement, termination/reauthorisation.