Assessing Information Security Risk Flashcards

1
Q

Asset

A

Anything of value that could be compromised, stolen, or harmed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

Any event or action that could cause damage to an asset or interruption of services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack

A

The intentional act of attempting to bypass one or more security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

A condition that leaves the system or assets open to harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploit

A

A technique that takes advantage of a vulnerability to perform an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Control

A

A countermeasure put in place to avoid, mitigate, counteract risks due to threats or attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Equation

A

Risk = Threats x Vulnerabilities x Consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management

A

The cyclical process of identifying, assessing, analyzing, and responding to risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Exposure

A

How susceptible an organization is to loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Qualitative Risk Analysis

A

Use descriptions and words to measure the likelihood and impact of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Quantitative Risk Analysis

A

Measures the impact of risk based completely on numeric values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enterprise Security Architecture

A

A framework used to define the baseline, goals, and methods used to secure a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Single Loss Expectancy (SLE)

A

Financial loss expected from a specific adverse event: SLE = Asset Value x Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annual Loss Expectancy (ALE)

A

ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Annual Rate of Occurrence

A

How often a threat successfully affects the enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classes of Information

A

Public, Private, Restricted, Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Technical Security Controls

A

Hardware or software to monitor and prevent threats and attacks, aka logical controls. E.g. firewall, IPS, encryption, etc

18
Q

Physical Security Controls

A

Measures that restrict, detect, and monitor access to physical areas or assets. E.g. door, lock, fence, mantrap, etc

19
Q

Administrative Security Controls

A

Monitor an org’s adherance to security policies and procedures. E.g. audits, compliance scans, etc

20
Q

Aggregate CIA Score

A

Info value (1-10) x value of threat score (1-10) for C, I, A, then add total for each attribute to get aggregate score

21
Q

Common Vulnerability Scoring System (CVSS)

A

Risk management approach where vulnerability data is quantified and then the degrees of risk to different types of systems or information are taken into account

22
Q

Common Vulnerabilities and Exposures (CVE)

A

Public dictionary of vulnerabilities

23
Q

Risk Avoidance

A

Risk has been completely eliminated, usually by removing the asset causing the risk

24
Q

Risk Transference

A

Moves responsibility of managing risk to another entity, such as insurance or outsourcing

25
Risk Mitigation
Process of implementing controls and countermeasures to reduce the likelihood and impact of risk to an org
26
Risk Acceptance
Organization determines after identification and analysis that a risk is within the org's appetite and no additional action is needed
27
Risk Deterrence
Influence a threat by convincing them an attack is not worth the cost, effort, or legal consequences
28
Inherent Risk
The risk an event will pose if no mitigating controls are put in place
29
Residual Risk
The risk that remains even after controls are put in place
30
Continuous Monitoring and Improvement
Constantly evaluating an environment for changes so new risks may be more quickly detected and business processes improved
31
IT Governance
Stakeholders ensure that those who govern IT resources are fulfilling objectives and strategies and creating value for the business
32
Defense in Depth
Layered security approach using personnel, processes, technologies, and architecture design
33
Policy
High level statement that defines the organization's intentions
34
Standards
Specific low-level mandatory controls that help enforce and support policies
35
Guidelines
Recommended, non-mandatory controls that support standards or provide a reference for decision-making if no standard exists
36
Procedures
Step-by-step instructions on tasks required to implement policies, standards, and guidelines
37
Separation of Duties
No one person has too much power or responsibility. Duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuses of power
38
Job Rotation
No one person stays in a vital role too long. Protects institutional knowledge and reduces risk of collusion and abuse of power/privileges
39
Mandatory Vacation
Prevents fraud by providing opportunity to review employee activity
40
Least Privilege
Users or systems should only have the minimal level of access that is necessary to perform the duties required of them
41
Incident Response
Process in which an org reacts to and reports security breaches within an acceptable time period
42
Compensating Control
A security measure put into place to mitigate a risk when a primary security control fails or cannot completely meet expectations.