Chapter 1 mod 2 Flashcards
What is the primary connection between information assurance, cybersecurity, and the risk management process?
The risk management process is closely involved with information assurance and cybersecurity.
How does the required level of cybersecurity relate to the entity’s willingness to accept risk?
The required level of cybersecurity depends on the level of risk the entity is willing to accept.
What is the role of evaluating risk in the implementation of security controls?
Evaluating risk helps determine the implementation of security controls to an acceptable level.
What are some examples of risks mentioned in the text, apart from cyberattacks?
Risks include fire, violent crime, and natural disasters, among others.
How do well-designed risk management technologies aid in dealing with vulnerabilities and threats?
Well-designed risk management technologies help recognize vulnerabilities and threats effectively.
What are examples of cyberattacks discussed in the text?
Examples include malware, social engineering, and denial-of-service attacks.
What is the significance of calculating the likelihood and potential impact of each threat in risk management?
Calculating likelihood and potential impact helps assess and manage the risks effectively.
Define “malware” and explain its role in the context of cybersecurity.
Malware refers to malicious software and poses a significant threat in the cybersecurity domain.
Explain the concept of social engineering and its relevance to cybersecurity risks.
Social engineering involves manipulating individuals to reveal sensitive information and is a cybersecurity risk.
Why is it essential to implement security controls, according to the text?
Implementing security controls is crucial to mitigating risks to an acceptable level.
In the context of cybersecurity, what factors influence the level of risk and its acceptance?
The potential consequences of activities in the environment influence the level of risk and its acceptance.
How do natural disasters contribute to the risk landscape discussed in the text?
Natural disasters are cited as situations affecting the environment and adding to the risk landscape.
Discuss the role of risk management in recognizing vulnerabilities and threats.
Risk management plays a key role in recognizing vulnerabilities and threats through well-designed technologies.
Define a vulnerability in the context of cybersecurity.
A vulnerability is described as a gap or weakness in an organization’s protection of its valuable assets, including information.
What is the role of a threat in the context of cybersecurity?
A threat is something or someone aiming to exploit a vulnerability to gain unauthorized access.
Explain how a threat can harm an asset by exploiting a vulnerability.
By exploiting a vulnerability, a threat can harm an asset, leading to potential damage or disruption.
Provide an example of a natural disaster acting as a threat in the context of cybersecurity.
An example is a major storm posing a threat to the utility power supply, which is vulnerable to flooding.
Identify an asset in the given scenario and explain its vulnerability.
The IT environment where production takes place is an asset, and its vulnerability is the dependence on the utility power supply.
How can a storm, as mentioned in the text, impact the availability of the IT environment?
The storm may cut off the utility power supply, making the IT components unavailable since they won’t work without power.
What is the primary responsibility mentioned in the text regarding cybersecurity and risk management?
The primary responsibility is to evaluate the likelihood of an event and take appropriate actions to mitigate the associated risk.
In the given context, why is the utility power supply considered vulnerable to a natural disaster?
The utility power supply is vulnerable because it is susceptible to flooding during a natural disaster like a major storm.
How does the text describe the relationship between vulnerabilities and assets in a cybersecurity context?
Vulnerabilities are gaps or weaknesses in the protection of valuable assets, including information.
What is the significance of evaluating the likelihood of an event in the context of risk management?
Evaluating likelihood is crucial for taking appropriate actions to mitigate the risk associated with potential events.
Define the term “asset” in the context of risk management terminology.
An asset is something in need of protection.