Chapter 1 Flashcards

1
Q

Risk Assessment

A

Deals with threats, vulnerabilities, and impacts of a loss of information processing capability or a loss of information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key components of the risk assessment process

A

Risks to which the organization is exposed
Risks that need addressing
Coordination with BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risks to which the organization is exposed

A

Develop scenarios that can help deal with risks as they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks that need addressing

A

Deciding which risks are likely and unlikely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Coordination with BIA

A

Business impact analysis provides an accurate picture of the threats facing the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE

A

Annual Loss Expectancy - expected monetary loss per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SLE

A

Single Loss Expectancy - monetary amount lost at one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two components of SLE

A

AV - Asset Value

EF - Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO

A

Annual Risk of Occurence - Likelihood of an event occuring within a year. Often drawn from historical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the formula used for Risk Assessment?

A

SLE * ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Vector

A

Method used by attacker to compromise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MTBF

A

Mean Time Between Failures - Anticipated lifetime of a component. Used for items that can be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MTTF

A

Mean time to failure - Used for components that cannot be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MTTR

A

Mean time to restore (or repair) - average downtime for a component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RTO

A

Recovery Time Objective - the maximum acceptable amount of time that a component can be down.
Beyond this time, outage negatively affects business.
Agreed upon in BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RPO

A

Recovery Point Objective - What point (time or version) of the system will be recovered? The more recent the more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Five approaches to identified risks

A
Risk Avoidance
Risk Transference
Risk Mitigation
Risk Deterrence
Risk Acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk Avoidance

A

Not engaging in the risky activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk Transference

A

Insurance policy (sharing risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Risk Mitigation

A

Taking measures to decrease the likelihood of an adverse event (antivirus programs)

22
Q

Risk deterrence

A

Posting warnings, setting up and publicizing negative consequences for the attacker

23
Q

CompTIA Risk Mitigation specifics

A

Audits of user rights and permissions
change management
incident management
DLP systems

24
Q

DLP system

A

Data Loss Prevention

25
Q

Platform as a service

A

vendors allow apps to be created and run on their infrastructure

26
Q

Software as a service

A

Applications run over the web

27
Q

Infrastructure as a service

A

Virtualization

28
Q

Risks of cloud computing

A

Regulatory Compliance
User Privileges
Data Integration/Separation

29
Q

Hypervisor

A

Software that hosts the virtual machines

30
Q

Risks associated with Virtualization

A

Breaking out of the VM

Network and Security Controls intermingle

31
Q

A good policy has a ______ that outlines what the policy intends to accomplish

A

Scope Statement (sentence)

32
Q

Policy Overview Statement

A

Provides the goal of the policy, why it is important and how to comply with it. (paragraph, checklist, bulleted list)

33
Q

Accountability Statement

A

Addresses who is responsible (by their position) for enforcement

34
Q

Exception Statement in a policy

A

Addresses how to deviate from the policy, e.g. who to contact for authorization

35
Q

Standard

A

Derived from policies, more specific than policies

36
Q

Scope and purpose of a standards document

A

Describes the intention of the standards document

37
Q

Key points of a standards document

A
Scope and Purpose
Roles and Responsibilities
Reference Documents
Performance Criteria
Maintenance and Administrative Requirements
38
Q

Roles and Responsibilities (Standards Document)

A

Who is responsible for implementing, monitoring and maintaining the standard

39
Q

Reference Documents (standards Doc)

A

Explains how the standard relates to different policies

40
Q

Performance Criteria (standards document)

A

Outlines how to accomplish the task

41
Q

Maintenance and Administrative Reqs (standards document)

A

manage and administer systems and networks. Example: how often to change passwords

42
Q

Guidelines

A

Less formal than Policies or Standards, helps to follow policies and standards

43
Q

Guideline Document sections

A

Scope and Purpose
Roles and Responsibilities
Guideline Statements
Operational Considerations

44
Q

Scope of a guideline or standard

A

Which employees it applies to

45
Q

Guideline statements

A

step by step instructions

46
Q

Operational Considerations (guidelines document)

A

what duties are required and at what intervals e.g. backups

47
Q

Acceptable Use Policies

A

How employees can use systems and resources, with consequences for misuse

48
Q

pod slurping

A

getting files from a network through USB or cloud drives

49
Q

Type I error

A

False Positive - False Alarm (positive is preferable)

50
Q

Type II error

A

False Negative - missed a threat