CISSP Quick Tips Flashcards
Vulnerability
The absence of a safeguard (in other words, it is a weakness) that can be exploited.
Threat
the possibility that someone or something would exploit a vulnerability, intentionally or accidentally, and cause harm to an asset.
Risk
the probability of a threat agent exploiting a vulnerability and the loss potential from that action.
What reduces risk?
Reducing vulnerabilities and/or threats
Exposure
An instance of being exposed to losses from a threat.
Countermeasure
Also called a safeguard, mitigates the risk.
• A countermeasure can be an application, software configuration, hardware, or procedure.
Due care
If someone is practicing due care, they are acting responsibly and will have a lower probability of being found negligent and liable if a security breach takes place.
Why is the importance of Security Management growing?
• Security management has become more important over the years because networks have evolved from centralized environments to distributed environments.
The objectives of security
To provide availability, integrity, and confidentiality protection to data and resources.
Planning horizon
Strategic planning is long term, tactical planning is midterm, and operational planning is day to day. These make up a planning horizon.
ISO/IEC 27002 (formerly ISO 17799 Part 1)
A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Security components
Can be technical (firewalls, encryption, and access control lists) or nontechnical (security policy, procedures, and compliance enforcement).
Asset identification
Should include tangible assets (facilities and hardware)
and intangible assets (corporate data and reputation).
Project sizing
Means to understand and document the scope of the project
Must be done before a risk analysis is performed.
Assurance
The degree of confidence that a certain security level is being provided.
CobiT
A framework that defines goals for the controls that should be used to
properly manage IT and to ensure that IT maps to business needs.
Four domains of CobiT
- Plan and Organize
- Acquire and Implement
- Deliver and Support
- Monitor and Evaluate.
ISO/IEC 27001
The standard for the establishment, implementation,
control, and improvement of the Information Security Management System.
How should security management work?
It should work from the top down (from senior management down to the staff).
Governance
The set of responsibilities and practices exercised by the board
and executive management with the goal of providing strategic direction,
ensuring that objectives are achieved, ascertaining that risks are managed
appropriately, and verifying that the enterprise’s resources are used responsibly.
What should determine which security model a company chooses?
Should depend on the type of business, its critical missions, and its objectives.
The OECD
an international organization that helps different governments
come together and tackle the economic, social, and governance challenges of
a globalized economy.
How can risk be treated?
It can be transferred, avoided, reduced, or accepted.
What is an example of risk transference?
When a company buys insurance.