Domain 1: Information Security Governance and Risk Management Flashcards
What does the acronym ALE stand for ?
Annual Loss Expectancy
What does Annual Loss Expectancy (ALE) mean?
Allows security practitioners to determine the annual cost of a loss due to risk.
What is the Annual Loss Expectancy (ALE) Formula?
Single Loss Expectancy (SLE) X Annual Rate of Occurrence (ARO)
What does the Annual Rate of Occurrence (ARO) mean?
The number of losses you suffer per year
What does the acronym ARO stand for?
Annual Rate of Occurrence
What does the phrase
Exposure Factor (EF)
mean in the Annual Loss Expectancy section?
The Percentage of value an Asset lost due to an incident.
What does Asset Value (AV) mean?
The value of an asset you are trying to protect.
What does ROI stand for?
Return on Investment
What does the acronym EF stand for in the Annual Loss Expectancy section?
Exposure Factor
What does the phrase
Single Loss Expectancy (SLE)
mean in the Annual Loss Expectancy (ALE) section?
The cost of a single Loss.
What does the acronym
SLE
stand for?
Single Loss Expectancy
What is the
Single LossExpectancy (SLE)
Formula?
SLE = AV * EF
What does the phrase
Return on Investment (ROI)
mean?
The amount of money saved by implementing a safguard
What component can you add to the a
Risk Calculation
to give it more meaning?
Add Impact to the equation: Risk = Threat * Vulnerability * Impact
What does AV stand for in the Annual Loss Expectancy framework?
Asset Value
What does
Total Cost of Ownership (TCO)
mean?
The total cost of a mitigated safeguard
What does the acronym
TCO
stand for?
Total Cost of Ownership
What is the
Single Loss Expectancy (SLE)
Formula?
Single Loss Expectancy (SLE) = Asset Value (AV) * Exposure Factor (EF)
Can a certification be performed by a trusted third party?
Yes
Who accepts the risk in an Accreditation?
The Data Owner
What is a certification?
A detailed inspection that verifies whether a system meets the documented security requirements.
When a certification is performed by a trusted third party, are the issues identified recommendations
or
mandatory
actions?
Recommendations
What is an Accreditation?
The Data Owner’s acceptance of the risk represented by the system.
What are NIST’s four steps to accreditation?
1: Initiation Phase (Research)
2: Security Certification Phase (Assessment)
3: Security Accreditation Phase (Decision to Accept Risk)
4: Continuous Monitoring Phase (Monitor)
What is an example of System Alteration in the CIA model?
Malcode Install
What is an example of Destruction in the CIA model?
DDOS
What is an example of an Availability Failure in the CIA model?
DDOS Attack
What does Integrity mean in he CIA model?
Protections against unauthorized and undetected alteration of information
What is an example of Disclosure in the CIA model?
Wikileaks
What is an example of a Confidentiality Failure in the CIA model?
Wikileaks
What does Confidentiality mean in the CIA model?
Protections against unauthorized disclosure of information
What does CIA stand for?
Confidentiality
Integrity
Availability
What is the Opposite of Integrity in the CIA model?
Alteration
What is an example of Data Alteration in the CIA model?
Web Page Defacement
What is the Opposite of Confidentiality in the CIA model?
Disclosure
What is an example of a System Integrity Failure in the CIA model?
Malcode Infection
What does Availability mean in the CIA model?
Protections against denying authorized parties access to information when needed
What is the Opposite of Availability in the CIA model?
Destruction
What is an example of a Data Integrity Failure in the CIA model?
Web Page Alteration
What does
Least Privilege
meanin the Cornerstone Concept section?
A user should only have the bare minimum Authorization to do his job and no more.
What does the phrase
Need to Know
mean?
Even if the user has the privilege to do something, it doe not mean that he needs to know it because of his job.
What is more granular?
Need to Know
or
Least Privilege?
Need to Know
What does Defense in Depth mean in the Cornerstone Concepst section?
A Layered Defense that reduces the risk of a single point of failure.
When discussing policy, the exam will use words like Mandatory (compulsory) or Discretionary. Best Practices are usually
discretionary but if you decide not to follow them, you better have a good reason.
Do not confuse the Data Owner with a person who owns his own data.
The Data Owner is responsible for ensuring the data is protected. A user who owns his own data has read/write access.
Memory Device: Quantitative –
Quantity – Hard Numbers
When human life is at risk,
practitioners must weigh those consequences very high.
What are the three parts to teh ISC Code of Ethics?
Preamble: Introduction
Canons: Mandatory and Applied in order
Guidance: Advisory
Always choose the most ethical answer
in order of the canons.
What is Ethics?
Ethics is doing what is morally right
What are the ISC Code of Ethics Canons in order?
1: Protect society, the commonwealth, and the infrastructure.
2: Act honorably, honestly, justly, responsibly, and legally.
3: Provide diligent and competent service to principals.
4: Advance and Protect the profession.
What does IAAA stand for?
Identity
Authentication
Authorization
Accountability
What is an example of an Identity in the IAAA model?
Username
What is an example of Authorized Use in the IAAA model?
Regular users can see their own processes but cannot see the password file.
What does Authorization mean in the IAAA model?
Permissions that the identity can perform an action on a system;
What does Nonrepudiation mean?
Users cannot deny actions identified through Accountability procedures within the IAAA framework.
Identity is validated through Authentication transactions.
Integrity of the system is validated with Accountability (through logging and audit of transactions).
“To Repudiate” means
to deny
What are three examples of Accountability in the IAAA model?
Logging
Audit
Sanctions.
What is meant by Authentication in the IAAA model?
The process of proving the identity claim; Ex - password
What is an example of an authentication (Identity Claim) response?
Password