CySA+ Study Notes 10 Flashcards
Threat Vectors are the specific methods that threats use to exploit a vulnerability.
Impact : amount of expected damage.
info …
AV = dollar value of an asset; EF = expected % of damage to an asset; SLE = expected dollar loss if risk occurs one time; AV x EF = SLE; ARO = number of times each year that we expect a risk to occur; ALE = amount of money we expect to lose each year from a risk; SLE x ARO = ALE.
info
Prescriptive Framework : describe mandatory security requirements that must be implemented in all circumstances.
Risk-Based Framework : allow org.’s to adjust to level of control based upon likelihood and impact of each risk; ex : NIST SP 800-37.
info …
MTTF : avg time a nonrepairable component will last.
MTBF : avg time gap between failures of a repairable component.
MTTR : avg time required to return a repairable component to service.
Risk Register : tracks risk information.
info …
Assessment are usually requested internally, while audits are often imposed by external requirements.
User Access Reviews : validate user rights and permissions.
System Assessment : validate security controls.
Certification : determines that a system meets security criteria.
Accreditation : approves use of a system in a specific environment.
info …
(1) initiating, (2) diagnosing, (3) establishing, (4) action, (5) learning.
IDEAL Model
commonly used when legal dispute is unlikely but customer and vendor still wish to document their relationship to avoid future misunderstandings;
MOU
SLR : document specific requirements that a customer has about any aspect of a vendors service performance; ex.’s : system response time, service availability, data preservation. Document SLRs in a SLA == written contract between vendor and customer describing conditions of service and penalties that will occur for failure to maintain the agreed upon service level.
info …
BPA : 2 org.’s agree to do business with each other in a partnership.
ISA : includes details on ways 2 org.’s will interconnect their networks, systems, and/or data.
MSA : includes all key terms that will govern the relationship.
SOW : each new project committed to which includes specific terms of that engagement.
info …
policies and standards are mandatory. Guidelines are optional. Procedures can go either way.
Security Policy Framework