Chapter 1 Measuring and Weighing Risk Flashcards

1
Q

SLExARO=ALE

A

Single Loss Expectancy (how much one loss costs)

x

Annual Rate of Occurence (how likely it is to happen)

=

Annual Loss Expectancy (how much you will lose)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative vs. Quantitative Risk Assessment

A

Qualitative

  • Opinion based and subjective
  • may be valued by the business, bot not necessarily by customers

Quantitative

  • Cost-based and subjective
  • May impede money making ability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Likelihood (risk)

A

A score representing the possibility of an event occurring

Can be expressed in qualitative or quantitative terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Vectors (risk)

A

The way in which an attacker poses a threat

  • May be a tool an attacker would use, the path they may follow, et cetera
  • Anything from a fake email to an unsecured hotspot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTBF (failure risk)

A

Mean Time Between Failure

-The life expecancy of a system or part that can be repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MTTF (failure risk)

A

Mean Time To Failure

-Average time to failure of an object that must be replaced, not repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTTR (failure risk)

A

Mean Time To Restore/Repair

-How long it will take to repair or restore a piece of equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RTO (failure risk)

A

Recovery Time Objective

-maximum time a process or service is allowed to be down and the consequences further down time may bring to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RPO (failure risk)

A

The time allowed between recovery point and failure

-Less time is more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Avoidance

A

Identify the risk, no longer engage in the actions that cause the risk

-Suzie downloaded a virus from a weird FTP server? All right, FTP ports are now blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Transference

A

Share the burden of risk with someone else, like an insurance company or a cloud storage service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Mitigation

A

Taking steps to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLP

A

Data Loss Prevention

-monitors systems to make sure key info isn’t missing. See who’s using and transmitting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Deference

A

Threaten potential enemies to keep them from wanting to initiate an attack on the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Acceptance

A

Sometimes the cost of implementing a system outweighs the cost of an attack, or sometimes you simply don’t have the budget to worry about certain attacks.

-These risks MUST be identified and quantified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three Different Cloud Deployment Types

A

PaaS-Platform as a Service

-Vendors allow apps to be created and run on their infrastructure

SaaS-Software as a Service

-Applications are run remotely over the web

Iaas-Infrastructure as a service

-Virtualization that’s paid for

17
Q

Risks of Cloud Computing

A

Regulatory Compliance

-You may have to comply with regulations set by, say SOX. It can be hard to prove that you’re complying with a cloud-based system.

User Privileges

  • you don’t have the same level of control and administration
  • Recovering from issues may be limited to Service provider tech staff availability

Data Integration/Segregation

-Data may be too close to other companies’. Keep your data encrypted and set parameters.

18
Q

Risks of Virtualization

A

Breaking out of the VM

-A skilled hacker may be able to break out of their virtual machine and wreak havoc system-wide

Network Security Controls can intermingle

  • The tools to administer a VM may not be as robust
  • If the hypervisor can be attacked, the whole system is compromised
19
Q

Policies

A

Provides employees with guidance about expected behavior Scope Statement

  • What the policy intends to accomplish, and which documents, laws, and practices the policy addresses
  • What the policy is about and how it applies to the users

Policy Overview Statement

-Goal of the policy, why it’s important, how to comply -roughly a paragraph long

Accountability Statement

  • Address who (position) is responsible for ensuring the policy is enforced
  • Give the user contact info for problem reports
  • Consequences for poor compliance

Exception Statement

  • Guidance for the procedure/process of deviation from the policy
  • May include an escalation contact
20
Q

Standards

A

Deals with specific issues and aspects of a business

Should provide enough detail that an audit may be performed

Scope and Purpose

-Explain intention. May include software, addons, etc.

Roles and Responsibilites

-Who’s responsible for implementing, monitoring, and maintaining?

Reference Documents

-Explains standards to clear up confusion or uncertainty

Performance Criteria

-Baselines and technology standards

Maintenance and Administrative Requirements

-What do you need to manage and administer the systems?

21
Q

Guidelines

A

Less formal policies or standards Give you step-by-step instructions for accomplishing certain tasks

Scope and Purpose

-Why it exists, to whom it applies

Roles and Responsibilities

-Which departments are assigned which tasks

Guideline Statements

-General steps on how to do shit

Operational Considerations -What needs to happen and when

22
Q

Separation of Duties

A

Make sure not just one person is running the show

Cuts down on chances of embezzlement and makes sure you’re not dependent on one person to do a job

23
Q

Privacy Policies

A

Essentially the privacy rights users have in general when making use of the company’s equipment

24
Q

AUPs

A

Acceptable Use Policies

-What users are allowed to do and the consequences for not following the AUP

25
Q

Security Policies

A

What controls are required to implement and maintain security systems

26
Q

Job Rotation

A

Defines the intervals at which employees must rotate jobs Same benefits of Separation of Duties

27
Q

Succession Planning

A

Which employees are able to fill certain positions should the positions vacate

28
Q

Error Types (false positives/negatives

A

Type I

-False positive. There wasn’t really a problem

Type II

-False negative. A problem wasn’t properly reported

Type III

-You came to the right conclusion, but for the wrong reasons

29
Q

BIA

A

Business Impact Analysis

Identify critical functions

-What is absolutely necessary to function?

Prioritize critical business functions

-What services do you need to restore first?

Calculating time frame for critical system loss

-How long can you survive without a given system?

Estimating tangible/intangible impact on the organization

  • Tangible: lost production or sales
  • Intangible: will customers lose faith in the company?
30
Q

Redundancy

A

Systems are…

Duplicated

-Mirroring of systems in case of whole system failure

Clustered

-Many systems working together to accomplish a certain task

Set up for failover

-If a system fails, another system will pick up where it left off

*This can be very expensive

31
Q

Fault Tolerance

A

The ability of a system to sustain operations in the event of component failure

-Have spare parts and backup electrical power at the ready

32
Q

RAID

A

RAID 0-Disk striping

-Data is written across disks simultaneously for insane speed and complete lack of fault tolerance

RAID 1-Mirroring

-Data is cloned on disks to provide for slow speeds and 100% fault tolerance

RAID 3-Striping with Parity Disk

  • A parity disk keeps information so if a disk in the RAID array goes out, a new one can be plugged in and the data can be restored
  • If the parity disk fails, the whole system fails

RAID 5-Striping with Parity

  • Parity information is written across all disks
  • If you lose any drive, you can plug in a new one and the data can be restored
  • 3-32 disks allowed