D1: Security & Risk Management Flashcards
D1 from example test simulators keywords
NDA
Non Disclosure Agreement; restricts dissemination of information; Compelling parties to not reveal information to others; Keeping secrets;
NCA
Non Compete Agreement; relates to employment with competition; Work restrictions; Agreement not to enter into or start a similar line of work in competition against another party;
AUP
Authorized Use Policy; warns employees about proper use of organizational assets; Allows for firing employee for misuse;
Exit Interview
Useful for discovering serious problems that might not be otherwise disclosed;
Education
Providing fundamental knowledge & definitions
Training
Providing tactical knowledge necessary for a job or task
Awareness
Imparting sensitivity or importance to a topic/issue to all personnel
Indoctrination
Incorporating an individual or group into the culture of the larger organization
CEO
Chief Executive Officer; Responsible for overall organization and its mission
CIO
Chief Information Officer; Responsible for aligning information & technical strategies; Most senior official in an organization responsible for IT & Systems that support enterprise; Senior Technology official;
CPO
Chief Policy Officer: Responsible for ensuring that there is compliance with org and regulatory privacy rules
CISO
Chief Information Security Officer; Responsible for monitoring & analyzing risk information associate with data protection
CSO
Chief Security Officer; Responsible for physical & Technical security of orgs assets; Responsible for development, oversight, mitigation, & other risk strategies; Senior most security official;
CTO
Chief Technology Officer; Chooses technology & scientific items; Executive person tasked with identifying useful technology, IT strategies, & partnerships;
ISSO
Information Systems Security Officer; Organizational role charged with developing, implementing, testing, & reviewing IT security;
Risk Management Categorize
Related to assigning a security role to an IT system
Risk Management Select
Identifies the appropriate measures needed to reduce risk satisfactorily
Risk Management Implement
Regards enacting the selected security controls
Risk Management Assess
Involves an independent assessor to test the controls
Risk Management Authorize
Take the risk assessment and make a risk determination
Risk Management Monitor
Relates to ongoing review & updating of controls and security status
Opportunity Cost
Next best use for funds
Depreciated Cost
Reflects wear, tear, and evaluation over time
Replacement Cost
current expenditure to gain an identical item
Purchase Cost
Original cost
Code of Regulations
Administrative law is published here
Constitution
Provides for information about interpretation of laws
NIST
National Institute of Standards & Technology; Publishes Special Publications, but NO laws; Publishes recommendations and standards, many related to IT security; Government standards body;
United States Code
Laws enacted by Congress published here
Accept Risk
Accept with knowledge of risk.
Avoid Risk
Change course or cancelling a project.
Deter Risk
Pursue the threat actor.
Mitigate Risk
Addressing risk and its factors. Try to reduce/prevent risk.
Transfer Risk
Assign risk to another party, insurance.
Ignore Risk
Move ahead without knowledge of the risk. NEVER an appropriate response.
Copyright
Legal right for creator of original work
Trademark
Recognized signs or expressions to identify product or service;
Patent
Intellectual property rights to a product/process for a limited period of time; protect innovative product/process; Exclusive rights to product/process;
Trade Secret
Formula, process, or design that is generally not known by others and has a viable commercial use; Guarded info not disclosed to the world;
DRM
Digital Rights Management; Systematized access control for digital media; Encrypted PDFs; Access control technology for restricting the use of propriety hardware & copyrighted works;
Wassenaar
Covers conventional arms sales and controls.
Economic Espionage Act
Criminalized stealing trade secrets
GDRP
General Data Protection Regulation; European law endorsed by the US that handles privacy issues; Enforced by Department of Commerce; International data privacy regulation;
FISMA
Federal Information Security Management Act; Handles risk management in the US government; US requirements for data security within federal orgs; Requires each federal agency to develop, document, & implement an agency wide pgm to provide info sec; Uses RMF
PCI
Payment Card Industry; Self-regulation for banking cards
Data Owner
Party that collects & is responsible for the information
Data Subject
The person/thing referred to by data;
Data Processor
Group/organization responsible for manipulation & computations with the data w/in their systems;
Data Custodian
Manages the information systems that perform processing; has physical control & server control; Facilitates use;
ISO 27000
Information system management system standards are a flexible set of standards and practices to manage security risks in an org.
NIST RMF
National Institute of Science & Technology Risk Management Framework; Government created set of guides to manage and control risk
COSO
Committee of Sponsoring Organizations is an initiative to combat organizational fraud; Preventing fraud and abuse; dedicated to guiding managers & government w/ regard to ethics, controls, & risk mgmt.;
COBIT
Control Objectives for Information and Related Technologies; is a best practice security framework from ISACA
AGILE
Software development methodology; Emphasize customer involvement & simple deliverables. Expects continual refinement of requirements, capabilities, & features through dev process;
Directive Security Control
Rules promulgated by management; EX] Policy, NDA, Exit Signs, Need to know policy;
Deterrent Security Control
Affect threat agents; EX] Guards, cameras, Logon banner with warning;
Preventative Security Control
stop an active attack; EX] Walls, fence, Biometric doorway control;
Compensating Security Control
take over for another function/measure while a threat is active; EX] RAID array;
Detective Security Control
only identify and do not stop threats; EX} motion detector, dogs, logs & audits;
Corrective Security Control
implements after a threat has manifested; EX] IPS, Fire Suppression;
Recovery Security Control
Restores operations to way they were; EX: Backups, DRP, cloud-based backup;
STRIDE Threat Modeling
Created by Microsoft; Spoofing, Tampering, Repudiation, Information Disclosure, DOS, Elevation of Privilege; Initially created as part of the process of Threat Modeling;
VAST Threat Modeling
Visual Agile & Simple Threat modeling; promotes its use across the entire infrastructure & the SDLC
ISA
Interconnection Service Agreement; Defines VPNs; Agreed-upon measures, settings & protocols taken by two orgs to facilitate communication;
OLA
Operating Level Agreement
MOU
Memorandum of Understanding; Provides refinement of duties and responsibilities; Provides terms & details necessary for two parties to work together;
MOA
Memorandum of Agreement; Achieving consensus toward a common goal; Document describing cooperative work to be taken together by two parties toward an objective;
SLA
Service Level Agreement; Contractual guarantee of performance; A promise; An agreement on the characteristics of quality and performance between two parties;
MSA
Master Services Agreement
MTD
Maximum Tolerable Downtime; Beginning of a disaster; Estimated time until catastrophic damage to an org has occurred;
MTBF
Mean Time Between Failures; The average failure rate; Estimation as to how often serious errors occur, typically measured in thousands of hours; Predicted elapsed time between failures of a mechanical or electronic system; Hardware reliability;
MTTR
Mean Time to Recovery (Repair); how long a system can take to recovery from a failure; Time needed to fix something; Standard recovery statistic indicating swiftness of DRP responses; Restoration average; Timely time it will take to regain functionality;
MTPD
Maximum Tolerable Period of Disruption; Identifies the point at which services must be restored or irrevocably damage the business;
RPO
Recovery Point Objective; What data must be available upon restoration & defines acceptable loss; Maximum # of transactions lost; # of transactions or quality of data that can be acceptably lost; Targeted maximum loss quantity;
RTO
Recovery Time Objective; When data must be available; Maximum amount of time lost; Maximum amount of time allowed for an outage;
MITM
Man-in-the-Middle; An attacker insinuates itself between client and server, observing or modifying communications; Intercepting and changing;
GDRP Lawful
Data must be legal to possess;
GDRP Purpose
Must have purpose for possessing the information;
GDRP Minimal
Data can only be retained as long as necessary;
GDRP Accuracy
Data must be as accurate as possible;
GDRP Storage Limitation
Only the information necessary for its purposes should be retained;