Chapter 1 Measuring and Weighing Risk Flashcards

1
Q

Threat Vectors

pg.8

A

A way in which an attacker poses a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mean Time Between Failures

pg.8

A

The measures of anticipated incidence of failure for a system or component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mean time to failure

pg.8

A

the average time to failure for a non repairable system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mean Time to Restore

pg.8

A

the measure for how long it takes to repair a system or component once a failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery Time Objective

pg.9

A

the maximum amount of time that a process or service is allowed to be down and the consequences still be considered acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Recovery Point Objective

pg.9

A

similar to RTO, but it defines the point at which the system needs to be restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Avoidance

pg.9

A

involves identifying a risk and making the decision not to engage any longer in the actions associated with the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Transference

pg.9

A

share some of the burden of the risk completely to another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Migration

pg.9

A

accomplished any time you take steps to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Deterrence

pg.10

A

understanding the enemy and letting them know the harm that can come their way if they cause harm to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Acceptance

pg.10

A

often the choice you must make when the cost for implementing any of the four choices exceeds there value for the harm that would occur if the risk came to fruition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud computing

pg.17

A

Hosting services and data on the internet instead of hosting it locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Platform as a service

pg.17

A

vendors allow apps to be created and run on the infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software as service

pg.17

A

applications are remotely run over the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Infrastructure as a service

pg.17

A

utilizes virtualization and the clients pay an outsourcer for resources used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Regulatory Compliance

pg.18

A

Agency rules with which you must comply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

User Privileges

pg.18

A

allowing access to data to which they would not otherwise have the access and cause harm to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Integration/segregation

pg.18

A

keeping data on secure servers/ makes sure that your data is not co mingled beyond your expectiations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virtualization

pg.19

A

allowing one set of hardware to host multiplying virtual machines

20
Q

Network and security controls can Intermingle

pg.19

A

tool used to administer the virtual machine monitor

21
Q

Standard

pg.21

A

deals with specific issues or aspects of a business/ derived from policies

22
Q

Roles and Responsibilities

pg.21

A

section of document outlines who is responsible for implementing, monitoring, and maintaining the standard

23
Q

Reference Documents

pg.21

A

how the standard relates to the organizations different policies/ connecting the standard to the underlying policies that have been put in place

24
Q

Performance Criteria

pg.21

A

outlines how to accomplish the task

25
Q

Guidelines

pg.22

A

is to help users comply with policies and maintain the standard

26
Q

Scope and Purpose

pg.22

A

the “whom it applies to /for” and the “why it exists”

27
Q

Guideline Statements

pg.23

A

step by step instructions on how to accomplish a specific task in a specific manner

28
Q

Operational Considerations

pg.23

A

specify and identify what duties are required and at what intervals

29
Q

Separation of Duties Policies

pg.24

A

designed to reduce the risk of fraud and to prevent other losses in an organization

30
Q

Collusion

pg.24

A

an agreement between two or more parties established for the purpose of committing deception or fraud

31
Q

Privacy Policies

pg.24

A

what controls are required to implement and maintain the sanctity of data privacy in the work environment

32
Q

Acceptable Use Policies

pg.24

A

describes how the employees in an organization can use company systems and resources.

33
Q

Security Policies

pg.25

A

what controls are required to implement and maintain the security of systems, users, and networks

34
Q

Mandatory Vacations

pg.26

A

requires all users to take time away from work to refresh

35
Q

Job Rotation

pg.26

A

intervals at which employees must rotate through poositions

36
Q

Least Privilege

pg.26

A

should be used when assigning permission

37
Q

Single Point of Failure

pg.30

A

build an infrastructure that has more than one network and services

38
Q

Contingency Plan

pg.30

A

a plan for the “what if’s”

39
Q

High Availability

pg.32

A

the measures used to keep services and systems operational during an outage

40
Q

Redundancy

pg.32

A

systems that either are duplicated or fail over to other systems int he event of malfunction

41
Q

Fail over

pg.32

A

the process of reconstructing a system or switching over to other systems when a failure is detected

42
Q

Fault Tolerance

pg.33

A

the ability of a system to sustain operations in the event of a component failure

43
Q

Redundant Array of Independent Disk (RAID)

pg.34

A

technology that uses multiple disks to provide fault tolerance

44
Q

RAID

pg.34

A

Level 0- disk striping- uses multiple drives and maps them together as a single physical drive

Level 1-disk mirroring- 100% redundancy- everything stored on 2 disk
disk duplexing- the same data is stored on both disks simultaneously

Level 3- disk striping with a parity disk

Level 5-disk striping with parity

45
Q

Backups

A

duplicate copies of information