Chapter 2 - Information Risk Flashcards

1
Q

Threat Categories

Physical Threats

A

Physical threats - include deliberate forms of threat, such as theft and vandalism, and also accidental threats, such as trackside cables becoming damaged for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Categories

Outages and Failures

A

Outages and Failures - Include such things as the absence of vital personnel, loss of power, hardware failures, software failures, And Human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Categories

Hacking and Abuse

A

Hacking and Abuse - amongst the most serios threat. Includes social engineering, DDOS, Malware, - from mainly outside the organization. Inside organization could include the likes of ease dropping and information theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Categories

Legal and Contractual

A

Legal and Contractual - Essentially threats include an organisations failure to meet legal or contractual obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Categories

Accidents and Disasters

A

Accidents and Disasters - most of these are accidental in nature, and will include natural disasters such as floods, tsunami, storms etc. - can also include environmental disasters such as chemical leaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accidental Vs Deliberate Threats

A

Accidental - Sometimes referred to as Hazards, especially when concerned with extrenal factors. The implication is that no deliberate attempt has been made to carry out a threat.

Deliberate - Occur when someone sets out with every intention of carrying out a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Categorization

General Vulnerabilities

A

General Vulnerabilities - Include basic weaknesses in software, hardware, buildings, people, processes, or procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability Categorization

Information-specific Vulnerabilities

A

Information Specific Vulnerabilities - Include unsecured computers, including personal computers, hand held devices, servers, unpatchs apps and OS, unsecured network boundaries, etc etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Impact Assessment (BIA)

A

Calculates the impact on one or more business assets for each threat can be determined. Once completed, the assessment is made of the likelihood or probability that vulnerabilities might be exploited, allowing the threats to be realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Management - Risk Management Standards & Frameworks

A

There are several national and international standards for risk management including:
- Nist
ISO/IEC 27005

Risk Management Methodologies Include:
- SABSA, OCTAVE, FAIR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Management Process

Which Areas are included?

A
  • Context Establishment
  • Risk Assessment (Includes Risk Identification, Risk Analysis, Risk Evaluation)
  • Risk Treatment
  • Communication and consultation
  • Ongoing monitoring and review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Context Establishment

A

Process of understanding what the organizations information assets are and how they fit into the overall business model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Identification

A

Identifying the threats - this should be carried out in conjunction with the understanding of any known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Analysis

A

Having identified the impacts of each threat, the next task is to assess the likelihood of each occurring. Once this stage is complete then a risk matrix can be drawn - generally this is a 3 by 3 with likihood (not likely, likely, highly likely) and impact (low, medium, high).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Appetite

A

The degree of risk and organization is willing to accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Treatment

A

Having decided from the output of the risk matrix the priorities in which to treat the risks identified, a risk treatment plan must be produced. This is when the decision to accept, avoid, reduce, or transfer is made.

17
Q

Communication and Consultation

A

It is essential throughout the entire risk management process that those conducting the work maintain good communications with other parts of the business, especially to those who the risks pertain.

18
Q

Monitoring and Review

A

The final stage is to continue to monitor the findings and update these with the landscape changing over time.

19
Q

What are the four options for treating risks? (strategic controls)

A

Avoid
Reduce
Transfer
Accept

20
Q

Tactical risk management controls

Detective Controls

Preventative Controls

Corrective Controls

Directive Controls

A
  • Detective controls - designed to identify information security incidents
  • Preventative Controls - Designed to stop an incident from taking place (firewalls)
  • Corrective Controls - Having identified an incident/error - these are controls made to correct/patch the vulnerability
  • Directive Controls - Also referred to as personnel controls these are intended to inform users about what they may and may not do
21
Q

Operational Risk Management Controls

  • Physical Controls
  • Procedural Controls
  • Technical Controls
A
  • Physical controls - place some form of device between an orgs assets and possible intrusion, (barries, restricted areas etc)
  • Procedural Controls - Controls aimed to guide users on the correct way of undertaking their work. (PROCEDURAL DOCUMENTS, POLICIES, or training)
  • Technical Controls - Based on both hardware and software (activity logging, detection systems, firewalls)
22
Q

Approaches to Risk Assessment

Qualitative Risk Assessment

A

While essentially subjective, it may be the best course of action when hard facts relating to impacts and frequency of events are hard to come by.

23
Q

Approaches to Risk Assessment

Quantitative Risk Assessment

A

This take a much more factual approach and can use statistical evidence to support both impact and likelihood assessments

24
Q

Approaches to Risk Assessment

Semi-quantitavive risk assessment

A

Alternatively - if facts and stats are not easily obtainer or indeed trusted, then an approach could be taken that a certain threshold constitutes low, medium, and high - ie if losses are 10k, 100k, 1000k.