Asset Security Flashcards
1
Q
Security Program
A
A comprehensive set of security policies, procedures, and practices designed to protect an organization’s information assets from security threats.
2
Q
Definition of risk, asset, vulnerability, threat, exposure
A
- Risk: The potential for harm or loss resulting from vulnerabilities and threats.
- Asset: Anything of value to an organization, including data, hardware, software, and intellectual property.
- Vulnerability: Weaknesses or gaps in security that can be exploited to harm assets.
- Threat: Any potential danger to assets, such as cyberattacks, natural disasters, or human errors.
- Exposure: The extent to which an asset is susceptible to risk.
3
Q
Risk options (accept, mitigation/reduction, transfer, avoid):
A
- Accept: Choosing not to take any action to mitigate or avoid a risk and accepting the potential consequences.
- Mitigation/Reduction: Implementing measures to reduce the likelihood or impact of a risk.
- Transfer: Shifting the risk to another party, often through insurance or outsourcing.
- Avoid: Taking actions to eliminate the risk entirely.
4
Q
Risk assessment types (ex. probability vs impact):
A
- Risk Assessment: The process of identifying, evaluating, and prioritizing risks. There are different approaches, including:
- Probability vs Impact: Assessing risks based on the likelihood of occurrence and potential consequences.
5
Q
CIA Triad:
A
- CIA Triad: Stands for Confidentiality, Integrity, and Availability, which are the three core principles of information security. It ensures that data is secure, accurate, and accessible when needed.
6
Q
Professional ethics:
A
- Professional Ethics: A set of moral principles and standards that guide the behavior and conduct of professionals in a specific field, such as information security.
7
Q
BCP meaning:
A
- BCP (Business Continuity Planning): The process of creating a plan and strategy to ensure that an organization can continue its critical operations in the event of a disruption or disaster.
8
Q
What are security controls?:
A
- Security Controls: Measures or safeguards put in place to protect assets, mitigate risks, and maintain security. Examples include firewalls, access controls, and encryption.
9
Q
ITIL, COBIT, COSO, ISO27000:
A
- ITIL (Information Technology Infrastructure Library): A framework for IT service management.
- COBIT (Control Objectives for Information and Related Technologies): A framework for governing and managing IT.
- COSO (Committee of Sponsoring Organizations of the Treadway Commission): A framework for internal control.
- ISO 27000: A series of international standards for information security management systems (ISMS).
10
Q
Governance (laws, regs, industry req):
A
- Governance: The framework of rules, practices, and processes by which organizations are directed and controlled. It includes compliance with laws, regulations, and industry requirements.
11
Q
Security posture:
A
- Security Posture: The overall security status of an organization, which reflects its ability to defend against and respond to security threats and risks.