Assessing Information Security Risk Flashcards

1
Q

Asset

A

Anything of value that could be compromised, stolen, or harmed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

Any event or action that could cause damage to an asset or interruption of services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack

A

The intentional act of attempting to bypass one or more security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

A condition that leaves the system or assets open to harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploit

A

A technique that takes advantage of a vulnerability to perform an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Control

A

A countermeasure put in place to avoid, mitigate, counteract risks due to threats or attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Equation

A

Risk = Threats x Vulnerabilities x Consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management

A

The cyclical process of identifying, assessing, analyzing, and responding to risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Exposure

A

How susceptible an organization is to loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative Risk Analysis

A

Use descriptions and words to measure the likelihood and impact of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quantitative Risk Analysis

A

Measures the impact of risk based completely on numeric values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enterprise Security Architecture

A

A framework used to define the baseline, goals, and methods used to secure a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Single Loss Expectancy (SLE)

A

Financial loss expected from a specific adverse event: SLE = Asset Value x Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annual Loss Expectancy (ALE)

A

ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Annual Rate of Occurrence

A

How often a threat successfully affects the enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classes of Information

A

Public, Private, Restricted, Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Technical Security Controls

A

Hardware or software to monitor and prevent threats and attacks, aka logical controls. E.g. firewall, IPS, encryption, etc

18
Q

Physical Security Controls

A

Measures that restrict, detect, and monitor access to physical areas or assets. E.g. door, lock, fence, mantrap, etc

19
Q

Administrative Security Controls

A

Monitor an org’s adherance to security policies and procedures. E.g. audits, compliance scans, etc

20
Q

Aggregate CIA Score

A

Info value (1-10) x value of threat score (1-10) for C, I, A, then add total for each attribute to get aggregate score

21
Q

Common Vulnerability Scoring System (CVSS)

A

Risk management approach where vulnerability data is quantified and then the degrees of risk to different types of systems or information are taken into account

22
Q

Common Vulnerabilities and Exposures (CVE)

A

Public dictionary of vulnerabilities

23
Q

Risk Avoidance

A

Risk has been completely eliminated, usually by removing the asset causing the risk

24
Q

Risk Transference

A

Moves responsibility of managing risk to another entity, such as insurance or outsourcing

25
Q

Risk Mitigation

A

Process of implementing controls and countermeasures to reduce the likelihood and impact of risk to an org

26
Q

Risk Acceptance

A

Organization determines after identification and analysis that a risk is within the org’s appetite and no additional action is needed

27
Q

Risk Deterrence

A

Influence a threat by convincing them an attack is not worth the cost, effort, or legal consequences

28
Q

Inherent Risk

A

The risk an event will pose if no mitigating controls are put in place

29
Q

Residual Risk

A

The risk that remains even after controls are put in place

30
Q

Continuous Monitoring and Improvement

A

Constantly evaluating an environment for changes so new risks may be more quickly detected and business processes improved

31
Q

IT Governance

A

Stakeholders ensure that those who govern IT resources are fulfilling objectives and strategies and creating value for the business

32
Q

Defense in Depth

A

Layered security approach using personnel, processes, technologies, and architecture design

33
Q

Policy

A

High level statement that defines the organization’s intentions

34
Q

Standards

A

Specific low-level mandatory controls that help enforce and support policies

35
Q

Guidelines

A

Recommended, non-mandatory controls that support standards or provide a reference for decision-making if no standard exists

36
Q

Procedures

A

Step-by-step instructions on tasks required to implement policies, standards, and guidelines

37
Q

Separation of Duties

A

No one person has too much power or responsibility.

Duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuses of power

38
Q

Job Rotation

A

No one person stays in a vital role too long.

Protects institutional knowledge and reduces risk of collusion and abuse of power/privileges

39
Q

Mandatory Vacation

A

Prevents fraud by providing opportunity to review employee activity

40
Q

Least Privilege

A

Users or systems should only have the minimal level of access that is necessary to perform the duties required of them

41
Q

Incident Response

A

Process in which an org reacts to and reports security breaches within an acceptable time period

42
Q

Compensating Control

A

A security measure put into place to mitigate a risk when a primary security control fails or cannot completely meet expectations.