Chapter 1: Information Security & Risk Management Flashcards

1
Q

Understanding an organizations mission, objectives, and goals…

A

are necessary to protecting their assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mission

A

Statement of ongoing purpose and reason for existence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Objectives

A

Statements of activities or end-states that the org wishes to achieve.
Observable & measurable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goals

A

Specify specific accomplishments that enable the org to meets its objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

–1– enable org to meet –2– which support the –3– and describe how it will be fulfilled

A

1-Goals
2-objectives
3-mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Management (RM)

A

“Process of determining the max acceptable level of overall risk to and from a proposed activity, then, then using risk assessment techniques to determine the initial level of risk and, if it is excessive, developing a strategy to ameliorate appropriate individual risks until the overall level of risk is reduced to an acceptable level.”

(Find the level of risk associated with a given asset or activity and do something about it if needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Assessment (RA)

A

Activities used to discover, analyze, and describe risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Qualitative Risk Assessment (QualRA)

A

Assets (software apps, info systems, business equipment, or buildings, etc.) are reviewed for known vulnerabilities against a database of potential vulnerabilities. The risk is then measured against relative scales to determine the probability of a threat exploiting the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QLRA typically identifies

A

Vulnerabilities
Threats
Threat probability
Countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities

A

Weakness in design, configuration, documentation, procedure, or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threats

A

Activities (if they occurred) that would exploit specific vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat probability

A

An expression of likelihood that a specific threat will occur
Low-Medium-High
(1-5 or 1-10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Countermeasures

A

Actual or proposed measures that reduce the risk associated with vulnerabilities or threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quantitative Risk Assessment (QNRA)

A

Extension of QLRA that includes additional elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

QNRA includes…

A
Asset value 
Exposure factor
Single loss expectancy
Annualized rate of occurrence 
Annual loss expectancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset Value (AV)

A

$ represents replacement cost of an asset or income derived from using an asset

17
Q

Exposure Factor (EF)

A

Proportion of an asset’s value (%) that is likely to be lost through a particular threat
(Impact of a specific threat on an asset)

18
Q

Single Loss Expectancy(SLE)

A

Cost of a single loss through the occurrence of a particular threat

19
Q

SLE =

A

asset value ($) X exposure factor (%)

AV x EF

20
Q

Annualized Rate of Occurrence (ARO)

A

Probability (%) that a loss will occur within a years time

Can be greater than 100% if it may occur more than once

21
Q

Annual Loss Expectancy (ALE)

A

Yearly estimated loss of an asset

22
Q

ALE =

A

ARO x SLE

23
Q

Quantifying countermeasures can include…

A

costs of countermeasures, changes in exposure factor, changes in single loss expectancy.

(Geographical considerations can also be used if pertinent)

24
Q

Specific risk assessment methodologies

A

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)
FRAP (Facilitated Risk Analysis Process)
Spanning Tree Analysis
NIST 800-30, Risk Management Guide for Information Technology Systems

25
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation: analysts identify assets and their criticality, identity vulnerabilities and threats, evaluate risks, and create a protection strategy to reduce risk

26
Q

FRAP

A

Facilitated Risk Analysis Process: QLRA used to pre-screen a subject and determine if a full blow QNRA is needed

27
Q

Spanning Tree Analysis

A

Visual method do identifying categories of risks as well as specific ones

28
Q

NIST 800-30

A

Risk Management Guide for Information Technology Systems: document that describes a formal approach to RA that includes Threat and vulnerability identification, control analysis, impact analysis, and a matrix depiction of risk determination and control recommendations

29
Q

Risk Treatment

A
After QLRA and/or QNRA are performed, the four general ways to handle the risks are:
Risk acceptance 
Risk avoidance 
Risk reduction
Risk transfer
30
Q

Risk Avoidance

A

Most extreme; associated activity is discontinued

31
Q

Risk Reduction

A

“Risk Mitigation “; uses countermeasures to reduce risk

32
Q

Risk Reduction techniques include:

A

Firewalls
Intrusion detection systems
DMZ networks

33
Q

Risk Acceptance

A

In a typical LOW-MEDIUM-HIGH ranking, risks labeled as LOW may be accepted

34
Q

Risk Transfer

A

Typically uses insurance as a means of mitigating risks; usually involves a cost (insurance premiums) that would need to be included in QNRA

35
Q

Residual Risk

A

This is the risk that is left after the other four techniques have been implemented