Chapter 1 Risk Management Flashcards

1
Q

The likelihood of a threat actor taking
advantage of a vulnerability by using a threat against
an IT asset

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anyone or anything with the motive
and resources to attack another’s IT infrastructure

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A weakness in an asset

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An action that a threat actor can use
against a vulnerability to cause harm

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pathways to gain access to infrastructure

A

Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.

A

Supply-chain attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Government reports
  • Media
  • Academic papers
A

OSINT (open-source intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Tor network, Tor Web browser
  • Encrypted anonymous connections
  • Not indexed by search engines
  • Tor encryption and anonymity
     Journalists
     Law enforcement
     Government informants
A

Dark Web/dark net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exchange of cybersecurity intelligence (CI) between
entities

A

Automated Indicator Sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • A form of AIS
  • Data exchange format for cybersecurity intelligence
A

Structured Threat Information eXpression (STIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Like RSS feed for threats
  • Consists of TAXII servers and clients
  • Real-time cyber intelligence feeds
A

Trusted Automated eXchange of Intelligence
Information (TAXII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Financial statement integrity
  • Internal controls
  • Type I and Type II
A

Statement on Standards for Attestation Engagements
System and Organization Controls (SSAE SOC 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • “Guide for Conducting Risk Assessments“
A

NIST Special Publication (SP) 800-30, Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protects EU citizens’ private data

A

General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protect American patient medical information

A

Health Insurance Portability and Accountability Act
(HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protect cardholder information

A

Payment Card Industry Data Security Standard (PCI
DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

    • Cloud Controls Matrix (CCM)
A

Cloud Security Alliance (CSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Specifies which users are allowed or denied access to a set of protected resources

A

Resource access policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Defines why and how you store data, for how long, and then how you dispose of it.

A

Data retention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Risk awareness
  • Cybersecurity intelligence sources
  • Evaluate security controls
  • Inherent (current) and residual risk
  • Implement security controls
  • Periodic review
A

Risk Assessment Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Environmental
  • Flood, hurricane
  • Person-made
  • Riots, terrorism, sabotage
  • Internal
  • Malicious insider, malware infections
  • External
  • Distributed denial of service (DDoS)
A

Risk Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • Mitigation/reduction
  • Transference/sharing
  • Avoidance
  • Acceptance
A

Risk Treatments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security controls are proactively put in place before
undertaking the risk

A

Mitigation/reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • Some risk is transferred to a third party in exchange for
    payment
  • Example: cybersecurity insurance
A

Transference/sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Avoid an activity because the risks outweigh potential
gains

A

Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • The current level of risk is acceptable
  • The risk falls within the organization’s risk appetite
A

Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Strives to determine the
likelihood and impact of threats

A

risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  • Based on numeric values
  • Asset value (AV)
  • Exposure factor (EF)
  • Percentage of asset value loss when negative incident
    occurs
A

Quantitative Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • Percentage of asset value loss when negative incident
    occurs
A

Exposure factor (EF)

30
Q
  • How much loss is experienced during one negative
    incident?

SLE = AV (Asset Value)x EF(Exposure Factor)

A

Single Loss Expectancy (SLE)

31
Q

Number of incidents per year.

A

Annualized rate of occurrence (ARO)

32
Q
  • Total yearly cost of bad things happening

ALE = SLE(single Loos Expectancy) X ARO(Annual Rate of Occurrence)

A

Annualized loss expectancy (ALE)

33
Q

Based on subjective opinions regarding:
- Threat likelihood
- Impact of realized threat

  • Threats are given a severity rating
A

Qualitative Risk Assessment

34
Q
  • Centralized list of risks, severities, responsibilities,
    and mitigations
  • Generally considered qualitative
  • Example: severity or impact ratings
  • Occasionally includes hard numbers (%, $)
A

Risk Register

35
Q
  • Table of risk details
  • Similar to a heat map but without colors
A

Risk Matrix

36
Q
  • Prioritize mission-critical processes
  • Assess risk
A

Business Impact Analysis (BIA)

37
Q
  • Payment processing systems
  • Customer/patient records
A

Prioritize mission-critical processes

38
Q
  • Identify sensitive data
  • Identify single points of failure
  • Identify security controls and compliance
A

Assess risk

39
Q
  • Average time between repairable component failures
  • Software patching
A

Mean time between failures (MTBF)

40
Q
  • Average time between NON-repairable component failures
  • Hard disks, switches, routers
A

Mean time to failure (MTTF)

41
Q

Time required to repair a failed component

A

Mean time to repair (MTTR)

42
Q
  • Maximum tolerable amount of data loss
  • Directly related to backup frequency
A

Recovery point objective (RPO)

43
Q
  • Maximum tolerable amount of downtime
  • Return systems and data to usable state
A

Recovery time objective (RTO)

44
Q
  • Top secret
  • Secret
  • Confidential
A

Government/military classification

45
Q
  • PII (personally identifiable information)
  • PHI (protected health information)
  • Proprietary
  • Public/private
  • Critical
  • Financial
A

Standard classification

46
Q
  • Ensure data privacy and breach notification
  • Levy fines
  • Protect intellectual property (IP)
A

Data Privacy Standards

47
Q
  • Any method of applying metadata
  • Example: cloud resource tagging
A

Data Classification Tools

48
Q
  • Legal data owner
  • Set policies on how data will be managed
49
Q

Ensure data complies with applicable regulations

A

Controller

50
Q

Handles data in accordance with privacy guidelines

51
Q

Responsible for managing data (permissions, backup) in alignment with
data owner policies

A

Custodian/steward

52
Q

Ensures data privacy regulation compliance such as with GDPR

A

Data privacy officer (DPO)

53
Q

Ensures data privacy regulation compliance such as with GDPR

A

Data privacy officer (DPO)

54
Q
  • Collect
  • Store
  • Process
  • Share
  • Archive/delete
A

Information Life Cycle

55
Q

One or more pieces of sensitive information that can
be traced back to an individual

A

Personally Identifiable Information (PII)

56
Q

One or more pieces of sensitive medical information
that can be traced back to an individual

A

Protected Health Information (PHI)

57
Q
  • Pseudo-anonymization
  • Data minimization
  • Tokenization
  • Data masking
A

Anonymization Techniques

58
Q

Replace PII with fake identifiers

A

Pseudo-anonymization

59
Q

Limit stored/retained sensitive data

A

Data minimization

60
Q

A digital token authorizes access instead of the original
credentials

A

Tokenization

61
Q
  • Hide sensitive data from unauthorized users
  • Masked out credit card number digits on a receipt
A

Data masking

62
Q

Location of data and laws that apply to it
- Where did the data originate?
- Where does the data reside?
- Which laws/regulations apply to the data?

A

Data Sovereignty

63
Q
  • Standard operating procedure (SOP)
  • Mandatory vacation, job rotation
  • Separation of duties (multi-person control)
A

Personnel Management Policies

64
Q
  • Reduce intentional/ unintentional sensitive data exfiltration
A

Data Loss Prevention (DLP) systems

65
Q
  • Legal review, regulatory compliance
  • Linking companies, partners, agencies
  • Vulnerability scan results
  • Mandatory training/ certification
  • Input from IT security professionals
A

Interconnection security agreement (ISA)

66
Q
  • Contractual document stating level of service
  • Guarantee service uptime
  • Consequences for not meeting requirements
A

Service level agreement (SLA)

67
Q

Broad terms of agreement between parties

A

Memorandum of understanding (MOU)

68
Q

Detailed terms between parties

A

Memorandum of agreement (MOA)

69
Q
  • Legal document
  • Responsibilities, investment, decision-making
A

Business partnership agreement (BPA)

70
Q

Prevent sensitive data disclosure to third parties

A

Non-disclosure agreement (NDA)