Class four Flashcards

1
Q

Stacked Risk

A

allowing seemingly separate potential issues with potential impact (risks) affecting the same digital landscape to accumulate. Without adequate identification and resolution, individual risks can form a toxic accumulation of issues that can be leveraged together to create a risk substantially greater than the individual components suggest. Megabreaches are the result of stacked risk in combination with a motivated attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

materiality

A

To have a level of significance or magnitude to be of concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

risk register

A

central repo that contains entries for each potential. significant loss or damage exposure. Usually needs a minimum materiality threshold. If the risk occurs, it becomes an issue rather than a risk. Items can be tracked here until the impact has been successfully managed and the root cause(s) resolved such that it is not likely to occur again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

risk assessment

A

systemaic process for proactive detection of potential hazards or gaps in an existing or planned activity, asset, service, application, system, or product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

STRIDE

A

Spoofing Identity (authentication)
Tampering with data (integrity)
Repudiation, or denying performing an action (non-repudiation)
Information disclosure (confidentiality)
Denial of service (availability)
Elevation of privilege (authorization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FAIR

A

Factor Analysis of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset (FAIR)

A

any data, device, or other component of the environment that supports information-related activities that can be illicitly accessed, used, disclosed, altered, destroyed, and/or stolen, resulting in loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk (FAIR)

A

Probable frequency and magnitude of future loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat (FAIR)

A

Anything capable of acting in a manner resulting in harm to an asset and/or organization - acts of God, malicious actors, errors, failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability (FAIR)

A

Probability that an asset will be unable to resist the actions of a threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat event frequency estimation (FAIR)

A

frequency with which a threat agent will come into contact with an asset & probability that they will act against the asset once in contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability (FAIR)

A

Dimensions - threat capability and control strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Capability (FAIR)

A

capability of threat community to act against an asset using a specific threat. Knowledge and experience of threat agent, skill of threat agent to perform relevant actions, and resources the threat agent can bring to bear (time, money, materials).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control strength (FAIR)

A

How well can the asset resist compromises? (5 levels of resistance strength) Controls increase the difficulty and complexity of causing a successful threat event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Primary loss (FAIR)

A

Factors: Value and volume of assets at risk. Type of threat action that can be performed, internal and external and how competent they are.
Forms of loss: productivity, response (managing the loss event), replacement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secondary loss (FAIR)

A

Factors: organizational, external.
Forms of loss: competitive advantage, fines/judgements, reputation

17
Q

Control categories (FAIR)

A

Avoidance (firewalls, physical barriers, moving assets elsewhere, reducing threat pop)
Deterrent (policies, logging & monitoring, enforcement practices, asset hardening, physical obstacles)
Vulnerability (authentication, access privileges, patching, configuration settings)
Responsive (backup and restore media and processes, forensics, incident response processes, credit monitoring for those whose PII was compromised)

18
Q

Complete mediation

A

enforcement of policy that every time you access something you have a security check to see if you have rights to access it.