Chapters 4 - 6 Flashcards

1
Q

What is Risk Management?

A

Identification, assessment and priotization of risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Two Formal Processes of Risk Management?

A
  • Risk Identification and Assessment
  • Risk Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are the Communities of Interest in Risk Management?

A
  • Information Security: leadership role in addressing risk
  • Information Technology: building and maintaining secure systems
  • Management: resource allocation and security prioritization
  • Users: crucial in early detection and proper response to threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Steps of Risk Management?

A
  • Evaluating Risk Controls
  • Determining Cost Effective Control Options
  • Acquiring and Installing Appropriate Controls
  • Overseeing Processes for Effectivity
  • Identfying Risks
  • Assessing Risks
  • Summarizing Findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Steps of Risk Identification?

A
  • Plan and Organize Process
  • Create System Component Categories
  • Develop Inventory of assets
  • Identify Threats
  • Specify Vulnerable Assets
  • Assign Value or Impact Rating to Assets
  • Assess Vulnerability Likelihood
  • Calculate Asset Relative Risk Factor
  • Preliminary Review of Possible Controls
  • Document Findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you Inventory Information Assets?

A
  • Identify Information Assets
  • Determine Which Attributes of Each Information Asset Should be Tracked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Asset Ranking?

A
  • Determine the Value of Assets
  • Prioritizing According to Value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Asset Classification Scheme?

A
  • Categorizes information assets based on sensitivity
  • Each category designates level of protection
  • Must be comprehensive and mutually exclusive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Relative Values?

A

Comparative judgements made to ensure the most valuable information assets are given the highest priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Threat Identification?

A

Assesses IT vulnerabilities and their capacity to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Vulnerability Assessment?

A

The process of defining, Identifying, classifying, and prioritizing vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Risk Assessment?

A

Create a method to evaluate the relative risk of each listed vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Extended Risk Formula?

A

Risk = Probability of Attack * Probability of Successful Attack * Value Lost on Successful Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Goals of the Risk Management Process?

A
  • Identify Information Assets and their Vulnerabilities
  • Rank them According to Sensitivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Goal of the Risk Identification Process?

A
  • Designate the Function of the Report
  • Define who is Responsible for Preparing and Reviewing the Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Risk Control?

A

Identifying Possible Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the Three General Categories of Control?

A
  • Policies
  • Programs
  • Technical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the Four Basic Strategies of Control Risks?

A
  • Avoidance: applying safeguards against risks
  • Transference: shifting risk to other areas or outside entities
  • Mitigation: reducing impact of vulnerabilities
  • Acceptance: accepting risk without control or mitigation
19
Q

What are the Types of Mitigation Plans?

A
  • Disaster Recovery Plan (DRP)
  • Incident Response Plan (IRP)
  • Business Continuity Plan (BCP)
20
Q

What is a Metric?

A
  • A measurement of a periodic or ongoing activity
  • Used by management to measure key processes for their effectivities
21
Q

What are the 3 Metrics categorizations?

A
  • Key Risk Indicators (KRI): metrics associated with risk measurement
  • Key Goal Indicators (KGI): metrics that portray attainment of strategic goals
  • Key Performance Indicators (KPI): metrics that show the efficiency or effectivenes of security-related activities
22
Q

What is Security Control?

A

Measures that reduce risk by eliminating or preventing harm or discovering and reporting it

23
Q

What are the Types of Control Classifications?

A
  • Management Controls
  • Operational Controls
  • Technical Controls
24
Q

What are Management Controls?

A

Focuses on the selection of operational and technical controls to reduce risk of loss

25
Q

What are Operational Controls?

A

Address control implementation and use of security policies and standards

26
Q

What are Technical Controls?

A

Involve the correct use of hardware and software security capabilities in systems

27
Q

What are the Types Control Classes?

A
  • Supportive Controls
  • Preventative Controls
  • Detection and Recovery Controls
28
Q

What are Supportive Controls?

A

Pervasive, underlying technical IT security capabilities that are interrelated and used by other controls

29
Q

What are Preventative Controls?

A

Focuses on preventing security breaches by inhibiting security violation attempts

30
Q

What are Detection and Recovery Controls?

A

Focuses on security breach responses by warning security violations or attempted violations

31
Q

What is a Cost-Benefit Analysis?

A
  • Identify controls that provide the greatest benefit given the available resources
  • Contrast the impact of implementing a control or not
  • A business decision
32
Q

What is an IT Security Plan?

A

Detail the actions needed to improve the identified deficiencies in the risk profile

33
Q

What details should be provided by the IT Security Plan?

A
  • What will be done
  • What resources are needed
  • Who is responsible
34
Q

What should be Included in the IT Security Plan?

A
  • Risks, recommended controls, priorities
  • Selected controls, needed resources
  • Responsible personnel, implementation dates
  • Maintenance requirements
35
Q

What are IT Security Plan Documents?

A
  • What needs to be done for each selected control
  • Responsible personnel
  • Resources and time frame
36
Q

What are Identified Personnel?

A
  • Implement new or enhanced controls
  • May need system config changes, upgrades, or installs
  • May involve development of new or extended procedures
  • Need to be encouraged and monitored by management
37
Q

How is security management a cyclic process?

A

constantly need to be repeated to respond to the changing IT systems and risk environment

38
Q

What is included in Implementation followup?

A
  • Maintenance of security controls
  • Security compliance checking
  • Change and configuration management
  • incident management
39
Q

Why is Maintenance and Monitoring Important?

A

Ensure the continued correct functioning and appropriateness of implemented controls

40
Q

What are the Tasks of Maintenance?

A
  • Periodic review of controls
  • Upgrade controls to meet new requirements
  • System changes do not impact controls
  • Address new threats or vulnerabilities
41
Q

What is Security Compliance?

A
  • An audit process to review security process to ensure system complies with security plan
  • Checks if suitable policies and controls are maintained and used correctly
42
Q

What is Change Management?

A
  • Process in reviewing proposed changes
  • May be informal or informal
  • Test patches to ensure no adverse affects on other applications
43
Q

What is Configuration Management?

A
  • Keeps track of configurations of each system in use and the changes done to them
  • Know what patches or upgrades might be relevant
  • Lists of hardware and software versions to help with restoration following a failure