Chapter 2 Flashcards

1
Q

Risk

A

Vulnerability x Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative risk analysis

A

Scenarios - 1 pagers
Delphi technique - anonymous feedback/response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative risk analysis

A

SLE (singe loss expectancy) = AV x EF (Exposure factor)
ALE = SLE x ARO (annual rate of occurence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk appetite - total across all assets; WILLING to shoulder
Risk capacity - total that CAN be shouldered
Risk tolerance - single threat-asset
Risk limit - max tolerable over target level

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk responses

A

Mitigation
Assign/Transfer
Deterrence
Avoidance
Acceptance
Reject/Ignore - NO NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Total risk - controls gap = residual risk

A

Controls gap is amount of risk reduced by implemented security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cost/benefit analysis:

ALE1 - ALE2 - ACS = value of safeguard

A

ACS - Annual Cost of Safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense in depth layers of control

A

Asset
Administrative controls
Logical/technical controls
Physical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control types

A

Preventive controls
Deterrent controls
Detective controls
Corrective controls
Compensating controls
Recovery controls
Directive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Maturity Model (RMM)

A

Ad-hoc
Preliminary - risk mgmt process but by diff departments
Defined - Standard organization-wide
Integrated - risk mgmt integrated with business processes; metrics
Optimized - Not reactive, but strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk mgmt framework

A

Identify
Analyze/Prioritize
Respond
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RMF (NIST)
- For gov’t

A

Prepare
Categorize - assets and risk
Select - controls
Implement
Assess - implemented and operating correctly
Authorize
Monitor - ongoing re-assessment, change mgmt, reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CSF (Cyber security framework)

A

Identify
Protect
Detect
Respond
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

A

Authority
Intimidation
Urgency
Scarcity
Consensus
Familiarity
Trust
Prepending - prepend with APPROVED, AUTHORIZED, RE, FWD, etc.
Phishing
Spear phishing - targeted
Whaling - high value target phishing
Smishing - SMS phishing
Vishing - phishing over VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Typo squatting

A

take advantage of mistyping in URL’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gamification for security training

A
17
Q
A