Chapter 1 Measuring and Weighing Risk Flashcards
Threat Vectors
pg.8
A way in which an attacker poses a threat
Mean Time Between Failures
pg.8
The measures of anticipated incidence of failure for a system or component
Mean time to failure
pg.8
the average time to failure for a non repairable system
Mean Time to Restore
pg.8
the measure for how long it takes to repair a system or component once a failure occurs
Recovery Time Objective
pg.9
the maximum amount of time that a process or service is allowed to be down and the consequences still be considered acceptable
Recovery Point Objective
pg.9
similar to RTO, but it defines the point at which the system needs to be restored
Risk Avoidance
pg.9
involves identifying a risk and making the decision not to engage any longer in the actions associated with the risk
Risk Transference
pg.9
share some of the burden of the risk completely to another entity
Risk Migration
pg.9
accomplished any time you take steps to reduce risk
Risk Deterrence
pg.10
understanding the enemy and letting them know the harm that can come their way if they cause harm to you
Risk Acceptance
pg.10
often the choice you must make when the cost for implementing any of the four choices exceeds there value for the harm that would occur if the risk came to fruition
Cloud computing
pg.17
Hosting services and data on the internet instead of hosting it locally
Platform as a service
pg.17
vendors allow apps to be created and run on the infrastructure
Software as service
pg.17
applications are remotely run over the web
Infrastructure as a service
pg.17
utilizes virtualization and the clients pay an outsourcer for resources used
Regulatory Compliance
pg.18
Agency rules with which you must comply
User Privileges
pg.18
allowing access to data to which they would not otherwise have the access and cause harm to it
Data Integration/segregation
pg.18
keeping data on secure servers/ makes sure that your data is not co mingled beyond your expectiations