Domain 1: Security and Risk Management Flashcards

1
Q

CIA Triad

A

Confidentiality: prevent the unauthorized disclosure of information.

Integrity: prevent unauthorized modification of information; keep accurate

Availability: ensures that the information is available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity
Subjects

Objects

A

Subjects: an active entity on an information system. (Doing something)

Object: a passive data file. (What is being accessed.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risks

Annualized Loss Expectancy (ALE)

Safeguard (Control)

Total Cost of Ownership (TCO)

Return on Investment (ROI)

A

Risk: the likelihood of something bad happening and the impact if it did; threats (source) and vulnerabilities (weakness)

Annualized Loss Expectancy (ALE): the cost of loss due to a risk over a year

Safeguard (Control): a measure taken to reduce risk

Total Cost of Ownership (TCO): total cost of a safeguard/control

Return on Investment (RIO): money saved by deploying a safeguard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Security

A

Information security is managing the risks to the confidentiality, integrity, and availability of information using administrative and, physical and technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Opposite of CIA

A

Disclosure

Alteration

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

.Prevent unauthorized access; disclosure, or read access
.Keeping data secret
.Data accessible to subjects with clearance, formal approval, and need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A

Prevent unauthorized modification or write access.

Data integrity:

System integrity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Ensure that data is available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Management

A

In order to determine risk, we must first determine what our most important (or critical assets) are

We use safeguards (or controls) to protect our assets and mitigate (not eliminate) risk.

Risk tolerance: the amount of risk that the business is willing to tolerate (or accept).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy

A

Managing the risk to confidentiality, integrity and availability of personally identifiable information (PII) using administrative, technical and physical controls.

Privacy is not concerned with integrity and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identity

A

A claim to be someone or something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

Proof that I am who I say I am.

A subject proves identity to another subjects or object

3 types
.Something you know: Password, PIN
.Something you have: token, phone debit card
Something you are: biometrics

Strong multi-factor authentication: Using a combination of 2 or more factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorization

A

What actions are are a subject permitted to perform?

Read, write execute
Privileges, rights, permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rule 802

A

Hearsay Rule: second hand information is normally inadmissible in court.

There are exceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evidence integrity

A

Integrity of evidence in a critical forensic function

Checksum: can ensure that no data changes occurred as a result of the acquisition and analysis

One-way hash functions are used for this purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EU General Data Protection Regulation

A

2018
Designed to harmonise data privacy laws across Europe and give data protection rights to individuals.

Replaced the EU Data Protection Directive.

17
Q

Health Information Portability and Accountability Act

A

Passed 1996
Security Rule 2003 (HITECH)
Modified 2009
Omnibus Rule 2013

18
Q

Gramm-Leach-Bliley Act

A

GLBA

1999

Requires protection of the confidentiality and integrity of consumer financial information.

19
Q

Risk Calculations

A

Annualized Loss Expectancy ALE= SLE x ARO

Exposure Factor (EF) - expressed as a percent of asset exposed (given a threat or vulnerability)

Single Loss Expectancy (SLE) = AV x EF

20
Q

STRIDE

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privileges

Threat categorization scheme developed by MS

21
Q

ISC Code of Ethics

A

I. Protect society, the common good, necessary public trust and confidence and the infrastructure

II. Act honorably, honestly, justly, responsibility, and legal

III. Provide diligent and competent service to principals.

IV. Advance and protect the profession.

22
Q

Risk Management Framework (RMF) Steps

A

Prepare - to execute the RMF
Categorize - the system and information
Select - the initial set of controls
Implement -the controls
Assess - the controls to determine correctness
Authorize - the system or common controls
Monitor - the system and associated controls

23
Q

Business Continuity Plan Steps

A

Project scope and planning
.Perform a structured review of the business’s organization
.Create a BCP team
.Assess the resources available
.Analyze the legal and regulatory landscape

Business Impact Analysis
 .Identify priorities
 .Risk identification
 .Likelihood assessment
 .Impact analysis
 .Resource prioritization

Continuity Planning
.Strategy development
.Provisions and processes (procedures and mechanisms)

Approval and Implementation