Ch1 Risk Management Flashcards
The CIA of cyber security stands for
Confidentiality; Integrity; Availability
a threat is defined as
an action or event that exploits a vulnerability
risk = ___ x ___
threat x vulnerability
priority risk management addresses high ___ and high ___ first
high impact and high vulnerability
impact is defined as
actual harm caused by a threat
for risk assessment, NIST stands for
national institute of standards and technologies
main document used for risk assessment
NIST 800-30
4 attributes of threat actors
internal/external; sophistication; resources; intent
social media and public records are considered ___ by threat actors
open source intelligence (OSINT)
6 types of threat actors
script kiddies; hacktivists; organized crime; nation-states; insiders; competitors
2 framework documents used in vulnerability assessment
NIST 800-37 and ISACA Risk IT
program used for more detailed vulnerability assessment
Nessus
vulnerability assessment done by a 3rd party
penetration (pen) testing
4 types of threats in threat assessment
adversarial; accidental; structural; environmental
4 responses to risk
mitigate; transfer; accept; avoid
a security control is a ____ we apply to ____ problems
mechanism/action; protect against or remediate
3 security control categories
administrative; technical; physical
5 security control functions
deterrent; preventative; detective; corrective; compensating
having two internet service providers for security reasons is an example of…
vendor diversity
layered security uses diversity and ____
redundancy
defense in depth uses what 2 types of diversity?
vendor; combining security control categories (physical, technical, administrative)
4 levels governing IT security
laws and regulations; [industry] standards; best practices; common sense/experience
roles and responsibilities are assigned by an organizations _____
policies
step by step instructions for implementing policy are ___
procedures
_______ policy governs what you can store on a company computer
acceptable use
______ policy governs categories of data
data sensitivity and classification
_______ policy governs password use, fobs, categories you have access to…
access control
______ policy governs password requirements (length, complexity…) and how to reset it
password