Course 5: Assets Threats and Vulnerabilities Flashcards

1
Q

What is the definition of risk?

A

Def: anything that can impact the confidentiality, integrity, or availability of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Risk is the same for every organization

A

False: Risk differs by organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Interpret risk by:

A

Effects and Events: interpret risk by considering the potential effects that negative events can have on a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the formula for calculating risk?

A

Likelihood x Impact = Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 4 reasons why we calculate risk in this field

A

-Prevent costly and disruptive events

-Identify improvements that can be made to systems and processes

-Determine which risks can be tolerated

-Prioritize the critical assets that require attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 risk categories

A

-Damage
-Disclosure
-Loss of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 5 questions should you ask to determine impact in a risk calculation?

A

-How would the business be affected?

-What’s the financial harm to the business and its customers?

-Can important operations or services be impacted?

-Are there regulations that can be violated?

-What is the reputational damage to the company’s standing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What 3 questions should you ask to determine likelihood in a risk calculation?

A

-Could the risk happen once a day?

-Could the risk happen once a month?

-Could the risk happen once in a year?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the definition of an asset?

A

Def: an item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give 4 examples of an asset

A

-buildings
-equipment
-data
-people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the definition of a threat?

A

Def: any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two types of threats?

A
  1. intentional - ex. a malicious hacker who gains access to sensitive information by targeting a misconfigured application
  2. unintentional - ex. an employee who holds the door open for an unknown person and grants them access to a restricted area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a vulnerability?

A

Def: a weakness that can be exploited by a threat/flaws within an asset (analogy: a weak lock on a front door)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 categories of vulnerabilities?

A

-technical - ex. misconfigured software that might give an unauthorized person access to important data

-human - ex. a forgetful employee who loses their access card in a parking lot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the definition of asset management?

A

Def: The process of tracking assets and the risks that affect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: You can only protect the things you account for

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the definition of Asset Inventory?

A

Def: A catalog of assets that need to be protected

18
Q

What is the definition of Asset Classification?

A

Def: The practice of labeling assets based on sensitivity and importance to an organization

19
Q

Asset classification determines whether an asset can be ____, ____, or ____

A

disclosed, altered or destroyed

20
Q

True or False: information can have multiple classification values at the same time

A

True

21
Q

What are the 4 levels of asset classification?

A

Public, Internal-only, Confidential, and Restricted

22
Q

Describe the public level of asset classification

A
  1. Lowest level
  2. Can be shared with anyone
  3. No negative consequences if released
23
Q

Describe the internal-only level of asset classification

A
  1. Second level
  2. Asset can be shared w/ anyone within the organization (i.e. employees and business partners)
24
Q

Describe the confidential level of asset classification

A
  1. Third level
  2. Asset should only be accessed by those working on a specific project.
  3. Disclosure may lead to a significant negative impact
25
Q

Describe the restricted level of asset classification

A
  1. Fourth and Highest level
  2. Asset is highly sensitive and must be protected.
  3. need-to-know information (i.e.. intellectual property, health/payment information)
26
Q

What are the 4 things you must know to determine the sensitivity and importance of an asset?

A
  1. What you have
  2. Where it is
  3. Who owns it
  4. How important it is
27
Q

What are four different kinds of assets?

A
  1. Digital Assets
  2. Information Systems that process data
  3. Physical Assets
  4. Intangible Assets
28
Q

Give an example of a digital asset

A

customer data or financial records

29
Q

Give an example of an information system that processes data

A

network or software

30
Q

Give an example of a physical asset

A

facilities, equipment, or supplies

31
Q

Give an example of an intangible asset

A

brand reputation or intellectual property

32
Q

What is the definition of Data?

A

Def: information that is translated, processed, or stored by a computer

33
Q

What are the 3 states of data?

A
  1. In use
  2. In transit
  3. At rest
34
Q

Describe data that is in the state of “in use”

A

It is data being accessed by one or more users

35
Q

Describe data that is “in transit”

A

It is data traveling from one point to another

36
Q

Describe data that is “at rest”

A

It is data not currently being access

37
Q

What is the definition of Information Security (InfoSec)

A

Def: the practice of keeping data in all states away from unauthorized users.

38
Q

What are the 3 cloud-based services?

A
  1. Software as a Service (SaaS)
  2. Platform as a Service (PaaS)
  3. Infrastructure as a Service (IaaS)
39
Q

What is Software as a Service (SaaS)?

A

front-end applications that users access via a web browser. The service providers host, manage, and maintain all of the back-end systems for those applications.

40
Q
A