Asset Security Flashcards

1
Q

Security Program

A

A comprehensive set of security policies, procedures, and practices designed to protect an organization’s information assets from security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of risk, asset, vulnerability, threat, exposure

A
  • Risk: The potential for harm or loss resulting from vulnerabilities and threats.
  • Asset: Anything of value to an organization, including data, hardware, software, and intellectual property.
  • Vulnerability: Weaknesses or gaps in security that can be exploited to harm assets.
  • Threat: Any potential danger to assets, such as cyberattacks, natural disasters, or human errors.
  • Exposure: The extent to which an asset is susceptible to risk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk options (accept, mitigation/reduction, transfer, avoid):

A
  • Accept: Choosing not to take any action to mitigate or avoid a risk and accepting the potential consequences.
  • Mitigation/Reduction: Implementing measures to reduce the likelihood or impact of a risk.
  • Transfer: Shifting the risk to another party, often through insurance or outsourcing.
  • Avoid: Taking actions to eliminate the risk entirely.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk assessment types (ex. probability vs impact):

A
  • Risk Assessment: The process of identifying, evaluating, and prioritizing risks. There are different approaches, including:
  • Probability vs Impact: Assessing risks based on the likelihood of occurrence and potential consequences.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad:

A
  • CIA Triad: Stands for Confidentiality, Integrity, and Availability, which are the three core principles of information security. It ensures that data is secure, accurate, and accessible when needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Professional ethics:

A
  • Professional Ethics: A set of moral principles and standards that guide the behavior and conduct of professionals in a specific field, such as information security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BCP meaning:

A
  • BCP (Business Continuity Planning): The process of creating a plan and strategy to ensure that an organization can continue its critical operations in the event of a disruption or disaster.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are security controls?:

A
  • Security Controls: Measures or safeguards put in place to protect assets, mitigate risks, and maintain security. Examples include firewalls, access controls, and encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ITIL, COBIT, COSO, ISO27000:

A
  • ITIL (Information Technology Infrastructure Library): A framework for IT service management.
  • COBIT (Control Objectives for Information and Related Technologies): A framework for governing and managing IT.
  • COSO (Committee of Sponsoring Organizations of the Treadway Commission): A framework for internal control.
  • ISO 27000: A series of international standards for information security management systems (ISMS).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Governance (laws, regs, industry req):

A
  • Governance: The framework of rules, practices, and processes by which organizations are directed and controlled. It includes compliance with laws, regulations, and industry requirements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security posture:

A
  • Security Posture: The overall security status of an organization, which reflects its ability to defend against and respond to security threats and risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly