CH21 Risk Assessment Flashcards

1
Q

What is a Risk?

A

The probability that a threat will be realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerabilities?

A

weaknesses in the design or implementation of a system.

Vulnerability is within your control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Threat?

A

Any condition that could cause harm, loss, damage, or compromise to our information technology systems.

Threats are external and beyond your control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 things that you can do with risk?

A

you can avoid it, you can transfer it, you can mitigate it, and you can accept it.

  1. Avoid – stopping the activity that has risk or choosing a less risky alternative.
  2. Transfer – passes the risk to a third party (most commonly, an insurance company)
  3. Mitigate – seeks to minimize the risk to an acceptable level.
  4. Accept – accept the current level of risk and the costs associated with it if the risk were realized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Residual Risk ?

A

the risk remaining after trying to avoid, transfer, or mitigate the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Qualitative Risk ?

A

Qualitative Risk analysis uses intuition, experience, and other methods to assign a relative value to risk. Experience is critical in qualitative analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Quantitative Risk?

A

uses numerical and monetary values to calculate risk. It can calculate a direct cost for each risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Single Loss Expectancy (SLE) ?

A

Cost associated with realization of each individualized threat that occurs.
SLE = Asset Value (AV) x Exposure Factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Annualized Rate of Occurrence (ARO)?

A

Number of times per year that threat is realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Annualized Loss Expectancy (ALE) ?

A

Expected cost of a realized threat over a given year
ALE = SLE x ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Security Assessments?

A

Security Assessments – verify that the organization’s security posture is designed and configured properly to help thwart different types of attacks. Assessments might be required by contracts, regulations, or laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Active Security Assessment ?

A

utilize more intrusive techniques like scanning, hands-on testing, and probing of the network to determine vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Passive Security Assessment?

A

utilize open source information, the passive collection and analysis of the network data, and other unobtrusive methods without making direct contact with the targeted systems. Passive techniques are limited in the amount of detail they find.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are physical, technical, or administrative security controls?

A
  1. Physical Controls – security measures that are designed to deter or prevent unauthorized access to sensitive information or the systems that contain it by physical access. (fences, lock doors, etc)
  2. Technical Controls – safeguards and countermeasures used to avoid, detect, counteract, or minimize security risks to our systems and information. (passwords, access controllers, encryption of the hard drive, etc)
  3. Administrative Controls – focused on changing the behavior of people instead of removing the actual risk involved. (Policies and procedures… employees need to lock your workstation when you are stepping away, mandatory vacation)

For the exam : be able to categorize things into these different types of controls based on the ten types of security controls. Something things can go into multiple categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are National Institute of standards and Technology (NIST) Security control categories ?

A
  1. Management Controls – Security controls that are focused on decision-making and the management of risk. (policies, procedures, legal compliance, software development methodologies). It is about how your system’s security is going to be managed and overseen.
  2. Operational Controls – focused on the things done by people by controlling their action. (user training, configuration management, testing disaster recovery plans, and conducting incident handling)
  3. Technical Controls – Logical controls that are put into a system to help secure it. (AAA – Authentication, Authorization, and Account), Access Control, encryption technology, passwords, and configuring your security devices

For the exam : be able to categorize things into these different types of controls based on the ten types of security controls. Something things can go into multiple categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Preventative, Detective, Corrective and Deterrent controls?

A
  1. Preventative Controls - Security controls that are installed before an event happens and are designed to prevent something from occurring
  2. Detective Controls - Used during the event to find out whether something bad might be happening
  3. Corrective Controls - Used after an event occurs
  4. Deterrent Controls - Discourages Intrusion attempts

For the exam : be able to categorize things into these different types of controls based on the ten types of security controls. Something things can go into multiple categories

17
Q

What is External Risk?

A

Risk that are produced by a non-human source and are beyond human control.

(Ex: wildfires, hurricane, Blackout, Hackers)

18
Q

What is Internal Risk?

A

Risks that are formed within the organization, arise during normal operations, and are often forecastable

(Ex: System error or Server crash)

19
Q

What is Legacy Systems Risk?

A

an old method, technology, computer system, or application program which includes an outdated computer system still in use.

(Ex: ICS and SCADA network… running Windows XP)

20
Q

What is Multiparty Risk?

A

Connection of multiple systems or organizations with each bringing their own inherent risks

21
Q

What is Intellectual property (IP) theft Risk?

A

business assets and property being stolen from an organization in which economic damage, the loss of competitive edge, or a slowdown in business growth occurs

22
Q

What is Software compliance and licensing Risk?

A

company not being aware of what software or components are installed within its network.