Chapter 18: Information Security Risks Flashcards

1
Q

What are the three main components of information security risks?

A
  • Confidentiality
    Integrity
  • Availibility of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is safeguarding information crucial?

What does this prevent? 3 types of impact

A

To prevent:
* Financial losses
* Reputational damage
* Regulatory penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the objective of implementing robust security measures?

To protect what from what?

A

To protect sensitive information from various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of cyber risks?

3 most obvious

A
  • Hacking
  • Virus infections
  • Phishing attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of physical risks in information security?

A

Theft of devices and social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are internal threats to information security?

A

Employee misconduct and mishandled exits with sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are external threats to information security?

A

Third-party failures and system disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was the outcome for Cambridge Analytica following the data breach?

A

Filed for bankruptcy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ISO/IEC 27001: 2013?

Governance.

A

A widely recognized information security standard offering general guidance on security governance, policies, risk assessment, and risk treatment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the scope of ISO/IEC 27001: 2013?

High-level……..external.

A

Provides limited, high-level guidance, with detailed implementation often found in external resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role do audits and management reviews play in ISO/IEC 27001: 2013?

What do they emphasise?

A

They are emphasized for maintaining information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of an information asset inventory?

Severity?

A

To identify and categorize information assets for better risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the typical categories in an information asset inventory?

4.

A
  • Highly confidential
  • Confidential
  • Internal
  • Public.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a risk assessment process in information security?

What techniques and processes are often employed.

A

Involves surveys, RCSAs, scenario analysis, and Monte Carlo simulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are behavioral controls in information security?

Examples.

A
  • Awareness campaigns
  • Rules of conduct
  • Monitoring
  • Sanctions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are technical controls in information security?

Examples.

A

Preventive measures like firewalls and encryption, and detective measures like DLPD.

17
Q

What are Key Risk Indicators (KRIs) for information security?

A

Metrics for exposure, control failures, stress, and causal factors.

18
Q

What was the cause of the Equifax data breach?

A

External intrusion due to an unpatched vulnerability.

19
Q

What is a risk taxonomy in information security?

A

A classification system for different types of information security incidents.

20
Q

What percentage of data leaks are insider-related, according to McAfee?

21
Q

What is the focus of risk-based protection in information security?

Why are some risks ignored?

A

Protecting critical assets since fully protecting all data is too costly.

22
Q

What is a cyber scenario assessment?

A

Modeling rare events like data breaches using scenario analysis.

23
Q

What are future trends in information security?

A

Advanced threat detection, enhanced data privacy regulations, and integrated security solutions.

24
Q

What is the role of Monte Carlo simulations in cyber scenario assessments?

A

To estimate loss distributions by considering detection time, data volume affected, and data value.

25
How is impact of data leak calculated?
IDL = time to detection x data corrupted (or stolen) per unit of time x data value
26
What was the cause of the Equifax data breach?
External intrusion due to an unpatched vulnerability.
27
What was the impact of the Facebook and Cambridge Analytica scandal? ## Footnote Significant damage to what?
Significant reputational damage and regulatory scrutiny.
28
What are some "Preventive Measures" within IT controls? ## Footnote Im in!!
Firewalls, encryption, password management.
29
What are some "Detective Measures" within IT controls? ## Footnote DLPD?
Data Leak Prevention and Detection (DLPD), log-in monitoring.
30
What are some "Mitigating Measures" within IT controls?
Regular backups, system redundancies.