Chapter 1 Flashcards

1
Q

What an example of a privacy law in Europe that dictates how data belonging to European citizens is handled?

A

GPDR -General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Privacy

A

the right of an individual to control the distribution of information about themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you protect data that is entrusted to you as a Cyber Security Analyst

A

By using the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability

A

an inherent weakness or flaw in a system or component which, if triggered or acted upon could cause a risk event to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat

A

Something or someone that aims to exploit a vulnerability in order to gain unauthrorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Authentication

A

Access control process that compares one or more factors of identification to validate the identity of someone trying to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define authorization

A

The right or a permission that is granted to a system entity to access a system or resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Confidentiality

A

Characteristic of data or info when it is not made available or disclosed to unauthorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Privacy

A

The right of an individual to control the distribution of information about themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define an asset

A

something in need of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is risk

A

The intersection of threats, vulnerabiliites and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define a threat vector

A

Approach and technique used by a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define the likelihood of occurrence

A

is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define impact as it relates to risk management

A

the magnitude of harm that can be expected to result from the consequences of a comprised CIA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three strategies for identifying risk.

A

Identify risk to communicate it clearly.

Employees at all levels of the organization are responsible for identifying risk.

Identify risk to protect against it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Risk assessment

A

the process of identifying, estimating and prioritizing risks to an organization’s operations assets, individuals, other organizations and even the nation.

17
Q

Wha vtis one outcome of a of a risk assessment be

A

The aligning of each identified risk with the goals, assets, or processes the organization uses

18
Q

What are the primary goals of a risk assessment

A

Estimate and prioritize risks

19
Q

What is risk treatment

A

making decisions about the best actions to take regarding the identified and prioritized risk.

20
Q

What are the four types of risk treatment

A

Avoidance
Acceptance
Mitigation
Transfer

21
Q

Define Risk avoidance

A

Decision to attempt to eliminate the risk entirely.

22
Q

Define Risk Acceptance

A

When the organization accepts the risk and makes no effort to mitigate, avoid, or transfer

23
Q

Define risk mitigation

A

taking actions to prevent or reduce the possibility of a risk event or its impact.

Mitigations include remiadation measures, security controls, creating and enforicing policies and procedures.

24
Q

How can Qualitative risk analysis be identified

A

Method for risk analysis that is based on the assignment of a descriptor such as low, med, high

Think of the quality of experience driving the quality of assignement

25
Q

How can Quntatative risk be identified

A

Method for risk analysis where numerical values are assinged to both impact and liklihood based on statistical probabilities, and monetized loss or gain

26
Q

Define Risk Tolerance

A

The level of risk an entity will assume in order to achieve a desired result

27
Q

Define physical controls

A

They typically provide ways of controlling, directing or preventing the movement of people and equipment throughout a specific physical location