Chapter 6: Risk and Personnel Management Flashcards
Define documentation review.
Documentation review is the process of reading the exchanged materials and verifying them against standards and expectations. This refers to security documentation in an audit.
What is ATO?
Authority to operate
What can often be the consequence of providing insufficient documentation to meet requirements of third party governance in an audit?
Failing to provide sufficient documentation to meet the requirements of third party governance.
What happens if you lose your ATO?
Generally, a full documentation review is required, along with an on-site review showing full compliance.
Why is understanding risk management concepts important?
It’s on the CISSP Exam, it’s also esssential to the establishment of a sufficient security stance, proper security governance, and legal proof of due care and due diligence.
What is the primary goal of risk management?
Reducing risk to an acceptable level.
Define asset.
An asset is anything within an environment that should be protected.
What can the loss or disclosure of an asset cause?
An overall security compromise, loss of productivity, reduction in profits, additional expenditures, discontinuation of the organization, and numerous intangible consequences.
Define asset valuation.
A dollar value assigned to an asset based on actual cost and nonmonitary expenditures.
Define threats.
Any potential occurrences that may cause an undesirable or unwanted outcome for an organization for a specific asset. Can be intentional or accidental. Threat agents are usually people, but can other. Fire, earthquate, etc.
Define vulnerability.
The weakness in an asset or the absence of the weakness of a safeguard of countermeasure. A flaw, loophole, oversight, error, limitation, frailty, or susceptibility in the IT infrastructure or any other aspect of an organization.
Define exposure.
Being susceptible to asset loss because of a threat.
Define risk
The possiblity or likelihood that a threat will exploit a vulnerability to cause harm to an asset.
risk = threat * vulnerability
Define safeguard
Anything that removes or reduces a vulnerability or protects against one or more specific threats. Also called a countermeasure.
Define attack
The exploitation of a vulnerability by a threat agent. Any intentional atempt to exploit a vulnerability of an organizations security infrastructure to cause damage, loss, or disclosure of assets.
Define breach
The occurrence of a security mechanism being bypassed or thwarted by a threat agent