Assessing Information Security Risk Flashcards
Asset
Anything of value that could be compromised, stolen, or harmed
Threat
Any event or action that could cause damage to an asset or interruption of services
Attack
The intentional act of attempting to bypass one or more security controls
Vulnerability
A condition that leaves the system or assets open to harm
Exploit
A technique that takes advantage of a vulnerability to perform an attack
Security Control
A countermeasure put in place to avoid, mitigate, counteract risks due to threats or attacks
Risk Equation
Risk = Threats x Vulnerabilities x Consequences
Risk Management
The cyclical process of identifying, assessing, analyzing, and responding to risks
Risk Exposure
How susceptible an organization is to loss
Qualitative Risk Analysis
Use descriptions and words to measure the likelihood and impact of risk
Quantitative Risk Analysis
Measures the impact of risk based completely on numeric values
Enterprise Security Architecture
A framework used to define the baseline, goals, and methods used to secure a business
Single Loss Expectancy (SLE)
Financial loss expected from a specific adverse event: SLE = Asset Value x Exposure Factor
Annual Loss Expectancy (ALE)
ALE = SLE x ARO
Annual Rate of Occurrence
How often a threat successfully affects the enterprise
Classes of Information
Public, Private, Restricted, Confidential
Technical Security Controls
Hardware or software to monitor and prevent threats and attacks, aka logical controls. E.g. firewall, IPS, encryption, etc
Physical Security Controls
Measures that restrict, detect, and monitor access to physical areas or assets. E.g. door, lock, fence, mantrap, etc
Administrative Security Controls
Monitor an org’s adherance to security policies and procedures. E.g. audits, compliance scans, etc
Aggregate CIA Score
Info value (1-10) x value of threat score (1-10) for C, I, A, then add total for each attribute to get aggregate score
Common Vulnerability Scoring System (CVSS)
Risk management approach where vulnerability data is quantified and then the degrees of risk to different types of systems or information are taken into account
Common Vulnerabilities and Exposures (CVE)
Public dictionary of vulnerabilities
Risk Avoidance
Risk has been completely eliminated, usually by removing the asset causing the risk
Risk Transference
Moves responsibility of managing risk to another entity, such as insurance or outsourcing