Assessing Information Security Risk Flashcards
Asset
Anything of value that could be compromised, stolen, or harmed
Threat
Any event or action that could cause damage to an asset or interruption of services
Attack
The intentional act of attempting to bypass one or more security controls
Vulnerability
A condition that leaves the system or assets open to harm
Exploit
A technique that takes advantage of a vulnerability to perform an attack
Security Control
A countermeasure put in place to avoid, mitigate, counteract risks due to threats or attacks
Risk Equation
Risk = Threats x Vulnerabilities x Consequences
Risk Management
The cyclical process of identifying, assessing, analyzing, and responding to risks
Risk Exposure
How susceptible an organization is to loss
Qualitative Risk Analysis
Use descriptions and words to measure the likelihood and impact of risk
Quantitative Risk Analysis
Measures the impact of risk based completely on numeric values
Enterprise Security Architecture
A framework used to define the baseline, goals, and methods used to secure a business
Single Loss Expectancy (SLE)
Financial loss expected from a specific adverse event: SLE = Asset Value x Exposure Factor
Annual Loss Expectancy (ALE)
ALE = SLE x ARO
Annual Rate of Occurrence
How often a threat successfully affects the enterprise
Classes of Information
Public, Private, Restricted, Confidential