Chapter 1 - Measuring and Weighing Risk Flashcards

1
Q

Rene

What is the Risk Calculator?

A

page 5.
SLE x ARO = ALE =>(AV x EF) x ARO = ALE
ALE = Annual Loss Expectancy, measures how much loss you could expect in a year.
ARO = Annualized Rate of Occurance
SLE = Single Loss Expectancy, represents how much you expect to lose at any one time.
AV - Asset Value
EF = Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rene

What are Threat Vectors?

A

page 8.
Is the way in which an attacker poses a threat.
Can be anything from a fake email that lures you into clicking (phishing) or an unsecure hotstop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rene

What is the measure of the anticipated incident of failures for a system or component?

A

page 8

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rene

What is Risk Assessment?

A

page 3
Deals with the threats, vulnerabilities and impacts of a loss of information-processing capabilities or a loss of information itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rene

What is the best way to explain quantitative and qualitative?

A

page 7
Quantitative - think of the goal as determining a dollar amount

Qualitative - think of a best guess or opinion of the loss, including reputation, goodwill and irreplaceable information, pictures or data that get you to a subjective loss amount.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rene

What is the average time to failure for a non-repairable system?

A

page 8

Mean Time to Failure (MTTF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rene

What involves identifying a Risk and making the decision not to engage any longer the actions associated with that risk?

A

page 9

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rene

What is the maximum amount of time that a process or service is allowed to be down and the consequences still be considered acceptable?

A

page 9

Recovery Time Objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rene

What does not imply to shift the risk completely to another entity?

A

page 9
Risk Transference
The burden of the risk is shared with someone else, such as an insurance company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rene

What is similar to RTO, but it defines the point at which the system needs to be restored?

A

page 9

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rene

How is Risk Mitigation Achieved?

A
page 9
Anytime you take steps to reduce risk.
* antivirus software
* educating users
* monitoring network traffic
* adding firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rene

What is the measure of how long it takes to repair a system or component once a failure occurs?

A

page 8

Mean Time to Restore (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rene

What can posting prosecution policies on your login pages and convincing them that you have steps in place to ID intrusions and act on them?

A

page 10

Risk Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rene

When you choose not to implement any prevention of risk due to costs and accept the potential costs or damage and agree to accept it.

A

page 10

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rene

What is cloud computing and examples?

A

page 17
Hosts services and data on the Internet instead of hosting it locally.

Office 365, Google Docs

Google Drive, Sky Drive, Amazon Web Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rene

What is IaaS?

A

page 17
Infrastructure as a Service
* utilizes visualization and clients pay an outsource for resource used
*closely resembles the traditional utility model used by electric, gas and water providers
* Go Grid is a well known example

17
Q

Rene

What is SaaS?

A

page 17
Software as a Service
* applications are remotely run over the Web, big advantage, no HW required
* Best know model this type is Salesform.com

18
Q

Rene

What is PaaS?

A

page 17
Platform as a Service
* AKA cloud platform services
* vendors allow apps to be created and run on their infrastructure
* two well known models are Amazon Web Services and Google Code

19
Q

Rene

What defines what controls are required to implement and maintain the sanctity of data privacy in the work environment?

A

page 24
Private Policies
Think of the private policy as a legal document that outlines how data collected is secured.

20
Q

Rene

What describes how the employees in an organization can use company systems and resources, both SW and HW?

A

page 24
Acceptable Use Policies, AKA “use policy”
* when portable devices are plugged directly into a PC, they bypass security measures (such as Firewalls) and allow data to be copied in what is known as “pod slurping”
* this can also be done if employees start using free cloud drives instead

21
Q

Rene

What are Security Policies?

A

page 25

They define what controls are required to implement and maintain the security of systems, users and netwroks.

22
Q

Rene

What policy requires all users to take time away from work to refresh?

A

page 25

Mandatory Vacation

23
Q

Rene

What is BIA?

A

page 29
Business Impact Analysis
Process of evaluating all the critical systems in an organization to define impact and recovery plans

24
Q

Rene

What refers to the measures used to keep services operational during an outage?

A

page 32

High Availability

25
Q

Rene

What refers to systems that either are duplicated or “fail over” to other systems in event of a malfunction?

A

page 32

Redundancy