Domain 1 Security and Risk Management Flashcards
Vulnerability
A vulnerability is a weakness in a system that can be exploited, such as software bugs, hardware flaws, or procedural gaps.
Threat
A threat is a potential danger that exploits a vulnerability, while a
threat agent is the entity that actually exploits the vulnerability.
Risk
Risk is the probability of a threat exploiting a vulnerability and the
impact it would have on the business.
exposure
An exposure is when an organization is open to potential losses due to vulnerabilities.
Control or Countermeasures
Controls or countermeasures are action taken to mitigate risks, such as firewalls, password management, and security training.
Name the three Control Types
● Administrative: Management-oriented like security policies, risk
management, and training.
● Technical: Hardware or software like firewalls, Intrusion Detection
System(IDS), encryption, and authentication mechanisms.
● Physical: Protect facilities and resources with measures like locks,
security guards, and CCTV.
Defense in Depth
Layered security approach to reduce the success of attacks.
- Multilayered defenses increase the difficulty for attackers to access
critical assets.
- Layers include various physical and technical controls based on asset sensitivity.
- Security Layers: Network Layer Security, Platform Layer Security, Application Layer Security, Data Layer Security, Response Layer Mechanism
Control Functionalities
Preventive
Avoid incidents (e.g., policies, hiring practices, encryption).
Control Functionalities
Detective
Identify incidents or intruders (e.g., auditing logs).
Control Functionalities
Corrective
Fix issues after an incident (e.g., reloading computer images).
Control Functionalities
Deterrent
Discourage potential attacks (e.g., visible CCTV).
Control Functionalities
Recovery
Return to normal operations (e.g., data backup systems).
Control Functionalities
Compensating
Alternative measures when primary control isn’t feasible (e.g., fence instead of security guards).
Name three of the Frameworks that describes Security Controls Development in their Framwork.
Frameworks like COBIT 5, NIST SP 800-53, and COSO aim to provide
business frameworks and sets of controls for IT management, US federal systems, and internal corporate controls, respectively.
Name three of the Frameworks that describes Process Management Development in their Framwork.
Frameworks such as ITIL, Six Sigma, and CMMI offer processes for IT
service management, business management strategies, and organizational development for process improvement.
Name three of the Frameworks that describes Enterprise Architecture Development in their Framwork.
Organizations can follow ad hoc approaches or defined security
architectures, with frameworks like Zachman, TOGAF, DoDAF, MODAF, and SABSA providing guidelines for enterprise architectures.
What steps involves Security Program Development?
Involves planning and organizing, implementing, operating, maintaining, monitoring, and evaluating. It’s supported by management and involves continuous improvement.
What are Intrusion Detection Systems (IDS)?
Intrusion Detection Systems (IDS) can alert companies to breaches but may not always identify the attacker.
Name the Law for Import/Export Legal Requirements
Organizations must comply with different countries’ import and export laws, like the Wassenaar Arrangement, which controls the export of dual-use goods and technologies.
Name six types of Legal Systems (Law system)
Civil (Code) Law System: Rule-based, used in continental Europe.
Common Law System: Precedent-based, developed in England.
Customary Law System: Based on regional traditions and customs.
Religious Law System: Based on religious texts and beliefs.
Mixed Law System: Combination of different legal systems.
Data Protection Regulations
Describe the Intellectual Property (IP) Law
Protect a company’s or individual’s creations from unauthorized use or duplication.
Companies must take reasonable steps to safeguard their Intellectual property (IP) and demonstrate due care.
Failure to protect IP adequately may lead to losing legal protection or cases such as wrongful termination suits.
What is Software Piracy?
Occurs when software is used or duplicated without authorization.
Name for typical Personally Identifiable Information (PII)
PII is data that can uniquely identify an individual. It’s essential to protect PII due to its use in identity theft and other crimes. Definitions of PII vary across jurisdictions and are based on risk assessments.
Typical PII includes full name, national ID numbers, IP addresses, and credit card numbers.
Privacy Laws
Privacy laws have been enacted globally in response to the need for PII protection.
Examples include the U.S. Federal Privacy Act of 1974, The Gramm-
Leach-Bliley Act, and HIPAA.
Canada and New Zealand have enacted horizontal privacy laws,
addressing privacy across all sectors.
Federal Privacy Act of 1974
Restricts government data collection and sharing of individual records.
Federal Information Security Management Act of 2002
Requires federal agencies to implement security programs for their information systems.
Department of Veterans Affairs Information Security Protection Act
Enforces additional controls and reporting for the Veterans Administration (VA) after a data breach.
Health Insurance Portability and Accountability Act (HIPAA)
Sets standards for handling personal medical information.