Chapter 2- Personnel Security and Risk Management Concepts Flashcards
UBA
User Behavior Analytics
Analyzing behavior of users, customers, etc for specific purpose
UEBA
User and Entity Behavior Analytics
Analysis of users and devices, networks, applications, etc that can correlate to an intrusion, reconnaissance, vulnerability, etc
VMS
Vendor Management System
Software solution that assists with managing and procuring staffing services, hardware, software, and other needed products or services. From a security perspective, can potentially keep communications and contracts confidential
Risk Management
Process of identifying factors that could damage or disclose assets, evaluating those factors in light of asset value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk.
Primary goal is to reduce risk to acceptable level.
Risk Analysis/Assessment
Examination of an environment for risks, the likelihood of occurrence, severity of damage it would cause, and assessing cost of various countermeasures. Results in a sorted prioritization of risks.
Risk Response
Evaluating countermeasures, safeguards, and security controls using a cost/benefit analysis and providing a proposal of response options in a report to senior management. If approved, responses are implemented into IT infrastructure and added to policy.
Risk Awareness
Effort to increase knowledge of the risks within an organization. Includes understanding value of assets, inventorying existing threats that can harm those assets, and the responses implemented to address those risks.
Asset
Any person, place, or thing (tangible or not) that is used in a business process or task
Asset Valuation
Evaluating or appraising each asset based on multiple factors- cost, criticality, etc. This ensures that only cost-effective safeguards are deployed (i.e. it makes no sense to spend $100,000 protecting something only worth $1000)
Threats
Any potential occurrence that may cause an undesirable or unwanted outcome for the organization or a specific asset
Exposure
Being susceptible to asset loss because of a threat; there is the possibility that a vulnerability can or will be exploited by a threat actor or event
Risk
The possibility or likelihood that a threat will exploit a vulnerability to cause harm and the severity of damage that could result
Risk Formulas
risk = threat * vulnerability
or
risk = probability of harm * severity of harm
Prudent Actions vs Reasonable Actions
Prudent actions are characterized by an above-average level of caution and diligence
Reasonable actions are aligned with common expectations and societal norms
Quantitative vs Qualitative Risk Assessment
Quantitative assigns real dollar value to the loss of an asset and is based on math
Qualitative assigns subjective and intangible values like perspectives, feelings, preferences, etc