Chapter 1 mod 2 Flashcards
What is the primary connection between information assurance, cybersecurity, and the risk management process?
The risk management process is closely involved with information assurance and cybersecurity.
How does the required level of cybersecurity relate to the entity’s willingness to accept risk?
The required level of cybersecurity depends on the level of risk the entity is willing to accept.
What is the role of evaluating risk in the implementation of security controls?
Evaluating risk helps determine the implementation of security controls to an acceptable level.
What are some examples of risks mentioned in the text, apart from cyberattacks?
Risks include fire, violent crime, and natural disasters, among others.
How do well-designed risk management technologies aid in dealing with vulnerabilities and threats?
Well-designed risk management technologies help recognize vulnerabilities and threats effectively.
What are examples of cyberattacks discussed in the text?
Examples include malware, social engineering, and denial-of-service attacks.
What is the significance of calculating the likelihood and potential impact of each threat in risk management?
Calculating likelihood and potential impact helps assess and manage the risks effectively.
Define “malware” and explain its role in the context of cybersecurity.
Malware refers to malicious software and poses a significant threat in the cybersecurity domain.
Explain the concept of social engineering and its relevance to cybersecurity risks.
Social engineering involves manipulating individuals to reveal sensitive information and is a cybersecurity risk.
Why is it essential to implement security controls, according to the text?
Implementing security controls is crucial to mitigating risks to an acceptable level.
In the context of cybersecurity, what factors influence the level of risk and its acceptance?
The potential consequences of activities in the environment influence the level of risk and its acceptance.
How do natural disasters contribute to the risk landscape discussed in the text?
Natural disasters are cited as situations affecting the environment and adding to the risk landscape.
Discuss the role of risk management in recognizing vulnerabilities and threats.
Risk management plays a key role in recognizing vulnerabilities and threats through well-designed technologies.
Define a vulnerability in the context of cybersecurity.
A vulnerability is described as a gap or weakness in an organization’s protection of its valuable assets, including information.
What is the role of a threat in the context of cybersecurity?
A threat is something or someone aiming to exploit a vulnerability to gain unauthorized access.
Explain how a threat can harm an asset by exploiting a vulnerability.
By exploiting a vulnerability, a threat can harm an asset, leading to potential damage or disruption.
Provide an example of a natural disaster acting as a threat in the context of cybersecurity.
An example is a major storm posing a threat to the utility power supply, which is vulnerable to flooding.
Identify an asset in the given scenario and explain its vulnerability.
The IT environment where production takes place is an asset, and its vulnerability is the dependence on the utility power supply.
How can a storm, as mentioned in the text, impact the availability of the IT environment?
The storm may cut off the utility power supply, making the IT components unavailable since they won’t work without power.
What is the primary responsibility mentioned in the text regarding cybersecurity and risk management?
The primary responsibility is to evaluate the likelihood of an event and take appropriate actions to mitigate the associated risk.
In the given context, why is the utility power supply considered vulnerable to a natural disaster?
The utility power supply is vulnerable because it is susceptible to flooding during a natural disaster like a major storm.
How does the text describe the relationship between vulnerabilities and assets in a cybersecurity context?
Vulnerabilities are gaps or weaknesses in the protection of valuable assets, including information.
What is the significance of evaluating the likelihood of an event in the context of risk management?
Evaluating likelihood is crucial for taking appropriate actions to mitigate the risk associated with potential events.
Define the term “asset” in the context of risk management terminology.
An asset is something in need of protection.
Explain what a vulnerability represents in the realm of operational risk management.
A vulnerability is an inherent weakness or flaw in a system or component that, if triggered, could lead to a risk event.
What is the primary goal of an organization’s security team in relation to vulnerabilities?
The goal is to decrease vulnerabilities by viewing the organization through the eyes of a threat actor and taking steps to discourage or make attacks more difficult.
Define “threat” and provide examples of typical threat actors in cybersecurity.
A threat is something or someone aiming to exploit vulnerabilities. Examples include insiders, outside individuals, formal entities (nonpolitical and political), intelligence gatherers, and technology.
What does the term “threat vector” refer to in the context of risk management?
A threat vector is the means by which a threat actor carries out their objectives.
Describe the role of security professionals in operational risk management
Security professionals use their knowledge to examine operational risk, use risk data effectively, work cross-functionally, and report actionable information to stakeholders.
Explain the importance of considering the likelihood of a potential vulnerability being exploited in risk management.
Likelihood is crucial in assessing the probability of a threat exploiting a vulnerability, considering the organization’s threat environment.
What is impact, and how does it relate to risk management?
Impact is the magnitude of harm resulting from unauthorized disclosure, modification, destruction of information, or loss of information system availability. It is a key factor considered in risk management.
How do security teams view their organization when working to decrease vulnerabilities?
They view their organization through the eyes of threat actors, asking why the organization might be an attractive target and taking steps to discourage or make attacks more difficult.
how can an organization decrease its vulnerability?
By understanding why it might be an attractive target and taking steps to discourage or make it more difficult for threat actors to launch a successful attack.
What is emphasized as a recurring process in the world of cyber regarding risk identification?
Identifying risks is highlighted as a recurring process involving the identification of different possible risks, characterization, and estimating their potential for disrupting the organization.
What is the significance of understanding your organization’s strategic, tactical, and operational plans in the context of risk identification?
Security professionals need to analyze their organization’s plans to effectively identify and characterize unique risks.
According to the text, how do security professionals contribute to risk assessment at a system level?
Security professionals are likely to assist in risk assessment at a system level, focusing on process, control, monitoring, or incident response and recovery activities.