Chapter 2 (Domain 1) Flashcards

Personnel Security and Risk Management Concepts

1
Q

IAM

A

Identity and Access Management

System of an organization which will provision the account and assign necessary privileges and access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AUP

A

Acceptable Use Policy
Policy that users must understand and sign to adhere to the necessary policies related to their perspective job position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

Anything used in a business process or task. Person, place, or thing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset Valuation

A

Value assigned to an asset based on a number of factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats

A

Any potential occurrence that may cause and undesirable or unwanted outcome for an organization or for a specific asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Agent/Actors

A

Intentionally exploit vulnerabilities. Usually people but can be programs, hardware, or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Events

A

Accidental occurrence or intentional exploitations of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Vector

A

AKA Attack Vector. The path or means by which an attack or attacker can gain access to a target in order to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

The weakness in an asset or the absence or the weakness of a safeguard or countermeasure is a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Exposure

A

Being susceptible to asset loss because of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk

A

The possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result.
Risk = Threat * Vulnerability
Risk = Probability of harm * Severity of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Safeguards

A

Security control, protection mechanism, or countermeasure that removes/reduces the vulnerability or protects against one or more specific threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack

A

An attack is the intentional attempted exploitation of a vulnerability by a threat agent to cause damage, loss, or disclosure of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Breach

A

Breach, intrusion, or penetration is the occurrence of a security mechanism being bypassed or thwarted by a threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Delphi Technique

A

An anonymous feedback-and-response process used to enable a group to reach an anonymous consensus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Single-loss Expectancy (SLE)

A

SLE = Asset Value (AV) * Exposure Factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Annual Loss Expectancy (ALE)

A
ALE = ARO * SLE
ALE = ARO * AV * EF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Mitigation

A

The implementation of safeguards, security controls, and countermeasures to reduce and/or eliminate vulnerabilities or block threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Risk Assignment

A

Assignment/Transferring is the placement of the responsibility of loss due to a risk onto another entity or organization. ie… insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk Deterrence

A

Process of implementing deterrents to would-be violators of security and policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Risk Avoidance

A

Is the process of selecting alternate options or activities that have less associated risk than the default, common, expedient, or cheap option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk Acceptance

A

The result after a cost/benefit analysis shows countermeasure costs would outweigh the possible cost of loss due wot a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Risk Rejection

A

Ignoring the risk.

24
Q

Inherent risk

A

The level of natural, native , or default risk that exists in an environment, system, or product prior to any risk management efforts being performed.

25
Residual Risk
Consists of threats to specific assets against which upper management chooses not to implement a response. Total risk - Control Gap = Residual risk
26
Control Gap
Difference between residual risk and total risk
27
Total Risk
Amount of risk an organization would face if no safeguards were in place. Total Risk = asset value * vulnerabilities * threats
28
Annual Cost of Safeguards (ACS)
Cost each year to implement safeguards
29
Cost/Benefit Analysis
Calculation used to determine whether the safeguard actually improves security without costing too much. [ALE pre-safeguard - ALE post-safeguard] - annual cost of safeguard (ACS) = value of the safeguard to the company
30
Three categories of security controls
Administrative Logical/Technical Physical
31
Administrative Controls
The policies and procedures defined by an organization's security policy and other regulations or requirements.
32
Logical/Technical Controls
Involves the hardware or software mechanisms used to manage access and provide protection for the IT resources and systems.
33
Physical Controls
Security mechanisms focused on providing protections to the facility and real-world objects.
34
Preventative Control
Deployed to thwart or stop unwanted or unauthorized activity from occurring.
35
Deterrent Control
Deployed to discourage security Policy violations.
36
Detective Control
Deployed to discover or detect unwanted or unauthorized activity.
37
Compensating Control
Deployed to provide various options to other existing controls to aid in enforcement and support of security policies.
38
Corrective Control
Modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred.
39
Recovery Control
An extension of corrective controls but have more advanced or complex abilities.
40
Directive Control
Deployed to direct, confine, or control the actions of subjects to force or encourage compliance with security policies.
41
Security Control Assessment (SCA)
Formal evaluation of a security infrastructure's individual mechanisms against a baseline or reliability expectations.
42
Risk Reporting
A key task to perform at the conclusion of a risk analysis. Risk reporting involves the production of a risk report and a presentation of that report to the interested/relevant parties.
43
Risk Register
Risk log. Document that inventories all the identified risks to an organization or system or within an individual project. Tracked activities: -Identifying risks -Evaluating the severity of and prioritizing those risks -Prescribing responses to reduce or eliminate the risks -Tracking the progress of risk mitigation
44
Risk Matrix
Risk Heat Map. Form of risk assessment that is performed on a basic graph or chart. - Qualitative - 3x3 grid
45
Risk Maturity Model (RMM) | 5 Levels
Assess the key indicators and activities of a mature, sustainable, and repeatable risk management process. 1) Ad hoc- Chaotic starting point from which risk management is initiated 2) Preliminary - Loose attempts are made to follow risk management process 3) Defined - A common or standardized risk framework is adopted organization wide. 4) Integrated - Risk Management operations are integrated into business processes. 5) Optimized - Risk management focus on achieving objectives
46
Prepending
The adding of a term, expression, or phrase to the beginning or header of some other communication. Ex... RE:, FW:, EXTERNAL, PRIVATE, INTERNAL
47
Smishing
Short Message Service (SMS) phishing. Phishing over text messages.
48
Vishing/SpIt
Phishing done over any telephony or voice communication system.
49
Tailgating
When an unauthorized entity gains access to a facility under the authorization of a valid worker but WITHOUT their knowledge.
50
Piggybacking
When an unauthorized entity gains access to a facility under the authorization of a valid worker by tricking the victim into providing consent.
51
First step in defining security needs related to personnel and being able to seek out new job hires?
Job description
52
Onboarding
Process of adding new employees to the organization using socialization and orientation.
53
Offboarding
The removal of an employee's identity from the IAM system once that person has left the organization.
54
Nondisclosure Agreement (NDA)
Used to protect the confidential information within an organization from being disclosed by a former employee.
55
User Behavior Analytics (UBA) and User and Entity Behavior Analytics (UEBA)
Concept of analyzing the behavior of users, subjects, visitors, customers, etc for some specific goal or purpose.
56
What is a security champion?
A member of a group who decides to take charge of leading the adoption and integration of security concepts into the group's work activities. Not a security team member.
57
What is gamification?
A means to encourage compliance and engagment by integrating common elements of game play into other activities, such as security compliance and behavioral change.