Chapter 1 Flashcards

1
Q

What an example of a privacy law in Europe that dictates how data belonging to European citizens is handled?

A

GPDR -General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Privacy

A

the right of an individual to control the distribution of information about themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you protect data that is entrusted to you as a Cyber Security Analyst

A

By using the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability

A

an inherent weakness or flaw in a system or component which, if triggered or acted upon could cause a risk event to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat

A

Something or someone that aims to exploit a vulnerability in order to gain unauthrorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Authentication

A

Access control process that compares one or more factors of identification to validate the identity of someone trying to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define authorization

A

The right or a permission that is granted to a system entity to access a system or resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Confidentiality

A

Characteristic of data or info when it is not made available or disclosed to unauthorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Privacy

A

The right of an individual to control the distribution of information about themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define an asset

A

something in need of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is risk

A

The intersection of threats, vulnerabiliites and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define a threat vector

A

Approach and technique used by a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define the likelihood of occurrence

A

is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define impact as it relates to risk management

A

the magnitude of harm that can be expected to result from the consequences of a comprised CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three strategies for identifying risk.

A

Identify risk to communicate it clearly.

Employees at all levels of the organization are responsible for identifying risk.

Identify risk to protect against it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Risk assessment

A

the process of identifying, estimating and prioritizing risks to an organization’s operations assets, individuals, other organizations and even the nation.

17
Q

Wha vtis one outcome of a of a risk assessment be

A

The aligning of each identified risk with the goals, assets, or processes the organization uses

18
Q

What are the primary goals of a risk assessment

A

Estimate and prioritize risks

19
Q

What is risk treatment

A

making decisions about the best actions to take regarding the identified and prioritized risk.

20
Q

What are the four types of risk treatment

A

Avoidance
Acceptance
Mitigation
Transfer

21
Q

Define Risk avoidance

A

Decision to attempt to eliminate the risk entirely.

22
Q

Define Risk Acceptance

A

When the organization accepts the risk and makes no effort to mitigate, avoid, or transfer

23
Q

Define risk mitigation

A

taking actions to prevent or reduce the possibility of a risk event or its impact.

Mitigations include remiadation measures, security controls, creating and enforicing policies and procedures.

24
Q

How can Qualitative risk analysis be identified

A

Method for risk analysis that is based on the assignment of a descriptor such as low, med, high

Think of the quality of experience driving the quality of assignement

25
How can Quntatative risk be identified
Method for risk analysis where numerical values are assinged to both impact and liklihood based on statistical probabilities, and monetized loss or gain
26
Define Risk Tolerance
The level of risk an entity will assume in order to achieve a desired result
27
Define physical controls
They typically provide ways of controlling, directing or preventing the movement of people and equipment throughout a specific physical location