1. Security And Risk Management Flashcards
What is the CIA triad?
Confidentiality, Integrity, and Availability
Define Confidentiality
Only people who need to know, know.
Define Integrity
Only people who need to access something, can.
Define Availability
The data is available all the time to people who know about it, and have access to it.
What does AAA stand for?
Authentication, Authorization, and Accountability
Define Authentication
Proves who you are. Something you; know, do, or are.
Define Authorization
Actions you can perform after you authenticate your ID.
Define Accountability
Hold users accountable for their actions
Who is ultimately responsible for security?
Senior management.
Define risk assessment
Identify assets, threats, and vulnerabilities. General write down of risks.
Define risk analysis
Adding number figures for costs of assets that are at risk.
What is OCTAVE?
Operationally Critical Threat, Asset and Vulnerability Evaluation.
A risk methodology, where you identify assets and their critically, vulnerabilities, and threats and base a protection strategy off that.
What is FRAP?
A risk methodology.Facilitated Risk Analysis Process. Qualitative analysis to determine if you should continue with a quantitative analysis. If likelihood is too low, the analysis is forgone.
What is NIST 800-30?
A risk methodology. A risk management made for information technology systems. It has 9 steps.
Define Qualitative Risk Analysis
Subjective analysis to help prioritize probability and impact if risk events.
Define Quantitative Risk Analysis
Providing a $ amount for a single risk event.
More sophisticated in nature, it relies on qualitative analysis to be relevant, but is much more difficult and requires a special subset of skills.
Define AV
Asset value
Define EF
Exposure factor
Define TCO
Total cost of ownership
Define SLE
Single loss expectancy
SLE = AV x EF
Define ALE
Annual loss expectancy.
ALE = SLE x ARO
Define ARO
Annual rate of occurrence.
Define total risk
The risk that exists before any control is implemented.
Total Risk = Threats x vulnerability x Asset Value
Define residual risk
Leftover risk after applying a control.
Residual Risk = Total Risk x Controls Gap