Chapter 2- Personnel Security and Risk Management Concepts Flashcards

1
Q

UBA

A

User Behavior Analytics
Analyzing behavior of users, customers, etc for specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

UEBA

A

User and Entity Behavior Analytics
Analysis of users and devices, networks, applications, etc that can correlate to an intrusion, reconnaissance, vulnerability, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VMS

A

Vendor Management System
Software solution that assists with managing and procuring staffing services, hardware, software, and other needed products or services. From a security perspective, can potentially keep communications and contracts confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Management

A

Process of identifying factors that could damage or disclose assets, evaluating those factors in light of asset value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk.

Primary goal is to reduce risk to acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Analysis/Assessment

A

Examination of an environment for risks, the likelihood of occurrence, severity of damage it would cause, and assessing cost of various countermeasures. Results in a sorted prioritization of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Response

A

Evaluating countermeasures, safeguards, and security controls using a cost/benefit analysis and providing a proposal of response options in a report to senior management. If approved, responses are implemented into IT infrastructure and added to policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Awareness

A

Effort to increase knowledge of the risks within an organization. Includes understanding value of assets, inventorying existing threats that can harm those assets, and the responses implemented to address those risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asset

A

Any person, place, or thing (tangible or not) that is used in a business process or task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asset Valuation

A

Evaluating or appraising each asset based on multiple factors- cost, criticality, etc. This ensures that only cost-effective safeguards are deployed (i.e. it makes no sense to spend $100,000 protecting something only worth $1000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats

A

Any potential occurrence that may cause an undesirable or unwanted outcome for the organization or a specific asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exposure

A

Being susceptible to asset loss because of a threat; there is the possibility that a vulnerability can or will be exploited by a threat actor or event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk

A

The possibility or likelihood that a threat will exploit a vulnerability to cause harm and the severity of damage that could result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Formulas

A

risk = threat * vulnerability
or
risk = probability of harm * severity of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prudent Actions vs Reasonable Actions

A

Prudent actions are characterized by an above-average level of caution and diligence
Reasonable actions are aligned with common expectations and societal norms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Quantitative vs Qualitative Risk Assessment

A

Quantitative assigns real dollar value to the loss of an asset and is based on math
Qualitative assigns subjective and intangible values like perspectives, feelings, preferences, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Delphi Technique

A

Anonymous feedback and response process used to enable a group to reach an anonymous consensus. Primary purpose is to elicit honest and uninfluenced responses from participants. Results presented to participants, then process repeated until consensus reached.

17
Q

The six major elements of quantitative risk analysis

A

Assign Asset Value (AV)
Calculate Exposure Factor (EF)
Calculate Single Loss Expectancy (SLE)
Assess the Annualized Rate of Occurrence (ARO)
Derive the Annualized Loss Expectancy (ALE)
Perform cost/benefit analysis of countermeasures

18
Q

Exposure Factor (EF)

A

Percentage of loss that an organization would experience if a specific asset were violated by a realized risk
Aka Loss Potential

19
Q

Single Loss Expectancy (SLE)

A

Potential loss associated with a single realized threat against a specific asset. Indicates the potential amount of loss an organization would experience
Calculation:
SLE = asset value (AV) * exposure factor (EF)

20
Q

Annualized Rate of Occurrence (ARO)

A

Expected frequency with which a specific threat or risk will occur within a single year. Can be calculated using historical data, statistical analysis, working with consultants, etc

21
Q

Annualized Loss Expectancy (ALE)

A

Possible yearly loss of all instances of a specific realized threat against a specific asset
Calculation:
ALE = asset value (AV) * exposure factor (EF) * annualized rate of occurrence (ARO)

22
Q
A