Cards 1-40 Flashcards
Risk is measured by d_______ the value of the a______ in relation to the t______ and v_______ associated with it.
Determining….
Asset
Threats and vulnerabilities
Security risk rating =
Asset v_______x
T______ L_______x
S_____ of in_____x
V______
Security risk rating = asset value x threat likelihood x
Severity of incident x
Vulnerability
Categories of assets exposed to risk?
- P_____________;
-N_____________;
-L___________
Physical - facilities; operational & industrial control systems & on-site processes and assets.
Non-physical - geo-political landscape; culture, speed of decision making and intensity of competition;
Logical - information & digital assets and the network or digital space that connects them.
The risk assessment process should be revisited c____ and c____ because of the elements that are constantly subject to change.
Cyclically and continuously.
The purpose of s security survey?
-determine current s_____ p____;
-ID d_______ & ex__________;
-compare current SP with what would be appropriate; and
-r__________ i___________.
Security posture;
Deficiencies and excesses;
Recommend improvements.
When considering vulnerabilities, what factors should be addressed?
-lack of b_____ for critical functions;
-single points of f______;
-co-location of c_____ systems, org_____ and c________
-inadequate preparedness for attacks;
-too easy for an a______ to attack facility;
-inadequate s______;
-presence of h_____ m______
-potential for collateral damage from n_______ companies
Backup;
Failure;
Critical systems, organizations and components;
Aggressor
Security
Hazardous material
Nearby
A security survey focuses more on v______ than a physical s____ a_______
Vulnerabilities;
Security assessment
A cost benefit analysis should be used in both a…….
P______S_______A____and a R____A_______
Physical security assessment and a risk assessment.
The functions included in a functional approach to a physical security assessment include:
-Security a___ & e_____;
-S_______ security m_______;
-C_ _ _ _;
-E______S____S_____ and
-S______ O_____ and the h____E_____.
Security architecture and engineering;
Structural security measures;
CPTED
Electronic Security Systems;
Security officers and the
Human element
Typically areas assessed in a physical security assessment include:
-b……d……w…….o…..;
-l…..s…..and c……..;
-s…….L……a……and el…….sys……..
-veh……tra…….par……….controls;
-v…….mgmnt;
-p_______handling.
Barriers, doors, windows, openings;
-locks, safes and containers;
-signage; lighting; alarm and electronic systems;
-vehicle traffic and parking controls;
-visitor management;
-package handling
Automated assessment tools should only assist in completing because they…..
-may give a f______s_____ of k___;
-may have a h____ c____;
-may have c_____s______; and
-can’t capture un_____ c_______
- may give a false sense of knowledge;
-may have a high cost;
-may have complex software; and - they can’t capture unquantifiable characteristics.
Defense in depth?
An adversary must overcome a number of protective features in S_________
Sequence
Why does each layer of security require a separate act by the adversary?
-causes U_____ in the perp’s mind;
-increases a___ p_____ t_____;
- adds s____ to the in______; and
-allows for more p____r____t____.
Uncertainty;
-attack prep time;
-steps to the intrusion; and
-police response time
Layered security should have i______ at each of the layers?
Interdependencies
Purposely left blank
Purposely left blank
What is the principle of balanced protection?
-the protection system’s individual applications and components will be in_____ and con_____ so that they provide an equal level of protection.
Integrated & converged