Chapter 6: Risk and Personnel Management Flashcards

1
Q

Define documentation review.

A

Documentation review is the process of reading the exchanged materials and verifying them against standards and expectations. This refers to security documentation in an audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ATO?

A

Authority to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can often be the consequence of providing insufficient documentation to meet requirements of third party governance in an audit?

A

Failing to provide sufficient documentation to meet the requirements of third party governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if you lose your ATO?

A

Generally, a full documentation review is required, along with an on-site review showing full compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is understanding risk management concepts important?

A

It’s on the CISSP Exam, it’s also esssential to the establishment of a sufficient security stance, proper security governance, and legal proof of due care and due diligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of risk management?

A

Reducing risk to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define asset.

A

An asset is anything within an environment that should be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can the loss or disclosure of an asset cause?

A

An overall security compromise, loss of productivity, reduction in profits, additional expenditures, discontinuation of the organization, and numerous intangible consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define asset valuation.

A

A dollar value assigned to an asset based on actual cost and nonmonitary expenditures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define threats.

A

Any potential occurrences that may cause an undesirable or unwanted outcome for an organization for a specific asset. Can be intentional or accidental. Threat agents are usually people, but can other. Fire, earthquate, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define vulnerability.

A

The weakness in an asset or the absence of the weakness of a safeguard of countermeasure. A flaw, loophole, oversight, error, limitation, frailty, or susceptibility in the IT infrastructure or any other aspect of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define exposure.

A

Being susceptible to asset loss because of a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define risk

A

The possiblity or likelihood that a threat will exploit a vulnerability to cause harm to an asset.

risk = threat * vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define safeguard

A

Anything that removes or reduces a vulnerability or protects against one or more specific threats. Also called a countermeasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define attack

A

The exploitation of a vulnerability by a threat agent. Any intentional atempt to exploit a vulnerability of an organizations security infrastructure to cause damage, loss, or disclosure of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define breach

A

The occurrence of a security mechanism being bypassed or thwarted by a threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Asset valuation details

A

p 246

18
Q

What are the six steps of quantitative risk analysis?

A
  1. Inventory assets and assign value
  2. Produce a list of all possible threats for each asset, calculate the exposure factor (EF) and single loss expectancy (SLE)
  3. Perform a threat analysis to calculate likelihood of each threat being realized per year == annualized rate of occurrence (ARO)
  4. Derive overall loss potential per threat by calculating the annualized loss expectancy (ALE)
  5. Research countermeasures for each threat, calculate changes to ARO and ALE based on an applied countermeasure
  6. Perform a cost/benefit analysis of each countermeasure and select the most appropriate
19
Q

What is exposure factor?

A

The percentage of loss that an orgamization would experience if a specific asset were violated by a realized risk, expressed as a percentage. Assets aren’t necessarily completely lost (100%) when compromised, they may just become less valuable.

20
Q

What is Single Loss Expectancy?

A

The cost associated with a single realized risk against a specific asset. It’s asset value (AV) * exposure factor (EF), and is a dollar value.

21
Q

What is Annualized Rate of Occurrence?

A

The expected frequency with which a specific threat or risk will occur within a single year. Can range from 0-any. >1 means the risk occurs on average more than once per year.

22
Q

What is Annualized Loss Expectancy?

A

The possible yearly cost of all instances of a specific realized threat against a specific asset

ALE = SLE * ARO

23
Q

What is a hybrid risk assessment?

A

One that uses quantitative as well as qualitative approaches.

24
Q

List techniques that can be used to perform qualitative risk analysis.

A
brainstorming
delphi technique
storyboarding
focus groups
surveys
questionnaires
checklists
one-on-one meetings
interviews
25
Q

What is a scenario?

A

A written description of a single major threat.

26
Q

Table on 254

A

.

27
Q

What is the Controls Gap?

A

The difference between total risk and residual risk. The amount of risk that is reduced by implementing safeguards.

28
Q

What are the four possible responses to risk?

A

Reduce or mitigate
Assign or transfer
Accept
Reject or ignore

29
Q

What is risk mitigation?

A

Implementation of safeguards and countermeasures to eliminate vulnerabilities or block threats. Also risk avoidance, which is eliminating the risk cause (removing FTP to avoid FTP attacks).

30
Q

What is risk assignment?

A

Placement of the cost of loss a risk represents onto another entity or organization. This includes buying insurance.

31
Q

What is risk acceptance?

A

Valuation by management of the cost/benefit analysis and determination that the cost of the countermeasure greatly outweighs the possible cost of loss due to risk. Management agrees to accept the consequences.

32
Q

What is risk rejection?

A

Denying that the risk exists.

33
Q

What is residual risk?

A

The risk that remains after countermeasures are applied.

34
Q

What is the formula for total risk?

A

total risk = threats * vulnerabilities * asset value

35
Q

List elements of constructing job descriptions which support personnel security.

A

Separation of duties
Job responsibilities
Job rotation

36
Q

What is separation of duties?

A

Dividing critical, significant, and sensitive work tasks among several individuals preventing any one person from having the ability to undermine or subvert vital security mechanisms. Protects against collusion.

37
Q

What are job responsibilities, and how do they support personnel security?

A

The specific work tasks an employee is required to perform on a regular basis. Used with least privilege. Your job responsibilities determine your access.

38
Q

What is job rotation?

A

Rotating employees among job positions. Provides knowledge redundancy. Reduces risk of fraud, data modification, theft, sabotage, information misuse.

39
Q

Why is reviewing a person’s online identity useful?

A

It can give insight into a person’s attitude, intelligence, loyalty, common sense, diligence, honesty, respect, consistency, and adherence to social norms or corporate culture.

40
Q

What is a Service Level Agreement?

A

AKA SLA. A document that defines levels of performance, expectation, compensation and consequences for entities, persons, or organizations that are external to the primary organization.

41
Q

List the issues commonly addressed in an SLA.

A

system uptime (%)
peak load
average load
maximum consecutive downtime (seconds/minutes)
responsibility for diagnostics
failover time (if redundancy is in place)