Domain 1: Security and Risk Management Flashcards
Review key terms related to governance, risk, compliance, and security principles.
Define:
Acceptable Use Policy
A set of rules specifying the norms and responsibilities for using organizational networks and systems, aiming to prevent misuse and protect digital assets.
A policy that defines the acceptable behaviors and actions of users when interacting with a network or system. It typically outlines user responsibilities, prohibited activities, and potential consequences for violations. The policy serves as a guideline for proper and respectful use of resources, and it helps protect the network, its users, and the organization from potential legal issues, security breaches, or reputation damage.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks. Or visit this Wikipedia page.
Define:
Acceptance (as Related to Risk) or Accepting Risk
A risk management approach whereby certain risks are deliberately acknowledged without immediate remediation, deeming them within tolerable limits.
Accepted Ways for Handling Risk - In the context of risk management, there are generally accepted strategies for handling risk, which can be summarized as the “Four T’s” of risk management. Treat - Implement measures to reduce the likelihood or impact of the risk. This often involves changing processes, procedures, or technology to mitigate the risk. Transfer - Shift the risk to a third party, typically through insurance, outsourcing, or partnerships. In this way, another entity assumes the responsibility for the risk’s consequences. Tolerate - Accept the risk without action if it falls within the organization’s risk appetite and threshold levels, often because the cost of treating it would exceed the benefit gained from mitigation. Terminate- Avoid the risk altogether by discontinuing the activity that generates the risk. This might mean changing business practices or stopping certain services or functions. There technically also is Risk rejection, we know the risk is there, but we ignore it, that is never acceptable.
For more information, view this lecture on Risk Management - Identification. Or visit this Wikipedia page.
Define:
Account Policy Enforcement
Implementing rules for managing user accounts, including password requirements and session management, to ensure security and compliance.
The implementation and enforcement of rules and procedures that govern how user accounts are managed within a system. This includes policies on password complexity, account lockouts, session timeouts, and user access rights. Enforcing account policies helps maintain system security, protect user data, prevent unauthorized access, and ensure regulatory compliance.
Define:
Accountability
The responsibility of individuals for their actions within a system, with activities tracked and recorded for security and policy adherence.
The principle that individuals are held responsible for their actions within a system. In the context of a system, this involves tracking and recording user activities, often through auditing and logging mechanisms, so that actions can be traced back to the individual users who performed them. Accountability helps deter malicious activities, aids in incident response and forensic analysis, and ensures that users follow policies and procedures.
For more information, view this lecture on IAAA- Part 1- Identification, Authentication, Authorization, and Accountability. Or visit this Wikipedia page.
Define:
Accountability of Governance
The responsibility of management to establish and maintain effective security policies and ensure the integrity and protection of systems and data.
This principle emphasizes that those in governing roles bear responsibility for the decisions and actions within their purview. In the context of a system or network, it means that management is responsible for the establishment, implementation, and effectiveness of security policies and procedures. This accountability ensures that governance roles prioritize system integrity, data protection, and adherence to regulatory standards.
For more information, visit this Wikipedia page.
Define:
Accountable Party
A person or entity responsible for sensitive information, security processes, and risk management, with authority to enforce compliance and resource allocation.
The individual or entity that is ultimately responsible for ensuring that activities involving sensitive information, security processes, or risk management practices are carried out properly and in line with organizational policies and standards. The accountable party is answerable for the outcomes of the decisions made, including the implementation of controls and mitigation of risks, and is typically a senior executive or manager who has the authority to commit resources and enforce actions. This role involves oversight and governance and is distinct from the roles of individuals who may be responsible for performing the day-to-day tasks associated with these activities.
For more information, visit this Wikipedia page.
Define:
Acquisitions
A business process of purchasing another company, with IT implications for system integration, data management, and security.
In the business context, acquisitions refer to the process of one company purchasing most or all of another company’s shares or assets in order to take control of that company. In terms of IT and cybersecurity, acquisitions can have significant implications for technology integration, data management, and security considerations. It is critical to conduct thorough due diligence and plan for the secure integration of systems, networks, and data during the acquisition process to manage potential security risks and ensure regulatory compliance.
For more information, view this lecture on 3rd Party, Acquisitions, and Divesture Security. Or visit this Wikipedia page.
Define:
Active Response
Immediate security action to block or mitigate threats, used in systems like intrusion detection and prevention.
A security measure that immediately takes action to prevent or mitigate a potential threat or attack. It is commonly used in intrusion detection and prevention systems. Examples include blocking an IP address after multiple failed login attempts or shutting down a network port that is being used for a malicious attack.
Define:
Adequate Security
A level of protection deemed sufficient for securing information systems and data against losses or damage, balancing potential harm against security costs.
The level of security considered sufficient to protect an information system, data, or network from unacceptable losses or damage. This typically involves a balance between the potential harm caused by a security incident and the cost and effort of implementing security measures. Adequate security is often defined by regulatory requirements, industry standards, or an organization’s risk tolerance and may vary depending on the nature of the assets being protected and the threat landscape.
Define:
Admissible Evidence
Legally acceptable evidence in a court of law, relevant and obtained properly; in IT, it includes data like logs and digital documents that must be preserved following digital forensic standards.
Any evidence that is legally permitted to be used in a court of law. It must be relevant, reliable, and obtained in a manner that follows the rules of evidence. Admissible evidence is typically used in criminal and civil trials to prove the guilt or innocence of a defendant. Examples of admissible evidence include eyewitness testimony, physical evidence, and expert witness testimony. In IT, it must be gathered and preserved following proper digital forensic procedures to maintain its integrity and authenticity. Examples include logs, digital documents, emails, and digital forensics reports.
For more information, view this lecture on Laws and Regulations- Evidence. Or visit this Wikipedia page.
Define:
Advisory
A formal notice informing about specific security issues, like vulnerabilities or threats, to help organizations maintain security awareness and response readiness.
A formal communication, often issued by a trusted security organization, vendor, or government entity, that provides information about a specific security issue, such as a newly discovered vulnerability, a novel threat, or a best practice for securing a system or network. Advisories play a crucial role in raising awareness of security risks and helping organizations respond effectively to maintain their security posture.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks.
Define:
Advisory Policy
A policy offering strategic guidance and recommendations to achieve security objectives, as opposed to mandatory policies, which are prescriptive.
A type of policy that provides strategic guidance on actions to be taken to achieve certain objectives, often within the context of security best practices. Unlike mandatory policies that dictate specific requirements, advisory policies typically offer recommendations and guidance for improving security. They can cover a wide range of topics, from password complexity and user behavior to disaster recovery strategies and incident response procedures.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks.
Define:
Air-gapped Networks
Isolated systems physically separated from unsecured networks like the Internet.
Air-gapped networks consist of systems deliberately disconnected from public or external networks to prevent cyber intrusions. This physical isolation significantly reduces the risk of remote attacks, making them ideal for handling classified or highly sensitive data. However, maintaining air-gapped systems requires alternative secure methods for data transfer and careful management to mitigate insider threats and ensure operational integrity.
For more information, visit this Wikipedia page.
Define:
Amortization
The financial process of spreading the cost of a debt or intangible asset over a period, reflecting gradual pay off or asset depreciation, relevant in IT for software and project investments.
A financial concept referring to the process of gradually paying off a debt over time through scheduled, typically fixed, payments. Each payment includes a portion that goes toward reducing the principal amount borrowed and a portion that covers the interest on the debt. Amortization can also refer to the spreading out of the cost of an intangible asset over its useful life for accounting and tax purposes. This allows businesses to write off the value of an asset incrementally, reflecting its consumption, depreciation, or obsolescence over time. In IT, for example, the cost of software or development of a technology project may be amortized over the period it is expected to provide value.
For more information, visit this Wikipedia page.
Define:
Annualized Loss Expectancy
(ALE)
A risk management calculation estimating the expected yearly cost of losses from risks, using the formula ALE = ARO x SLE, helping in prioritizing security investments.
A calculation used in risk management to estimate the yearly cost of potential losses from an identified risk. It is determined by multiplying the Annual Rate of Occurrence (ARO) of an event by the Single Loss Expectancy (SLE), which is the cost of a single occurrence of that event. ALE helps organizations prioritize risks and make informed decisions about where to invest in security measures. It’s calculated using the formula ALE = ARO x SLE. ARO (Annual Rate of Occurrence) - The estimated frequency at which a specific threat or event is expected to occur within a one-year period. SLE (Single Loss Expectancy) - The estimated monetary loss or impact from a single occurrence of a specific threat or event.
For more information, view this lecture on Risk Management- Assessment Part 2. Or visit this Wikipedia page.
Define:
Annualized Rate of Occurrence
(ARO)
A risk assessment measure estimating the likelihood of a security incident occurring within a year, used to understand and manage risk exposure.
A measure used in risk assessment that estimates the likelihood of a particular security incident occurring within a given year. It’s a probabilistic estimate, often based on historical data or expert judgment. By considering the ARO alongside the potential impact of an incident, organizations can better understand and manage their risk exposure, helping to prioritize security investments and mitigation strategies. If it is likely to happen 5 times a year the ARO is 5, if it is likely to happen every 5 years the ARO is 0.2.
For more information, view this lecture on Risk Management- Assessment Part 2. Or visit this Wikipedia page.
Define:
Anonymization of Data
The process of removing identifiable information from data to preserve individual anonymity while still enabling data analysis.
The process of removing or obfuscating personally identifiable information from a dataset in such a way that the individuals whom the data describes remain anonymous. Techniques for data anonymization might include data masking, pseudonymization, and data shuffling. The goal is to protect individual privacy, especially in cases where data is shared or published, while still enabling useful analysis of the data.
For more information, visit this Wikipedia page.
Define:
Appearance of Independence
The perception that an individual or organization is unbiased and not influenced by external factors, important for roles requiring objectivity like auditing.
The perception or appearance that an individual or organization is not influenced or biased by outside forces. It is used in professional settings, such as in auditing, to ensure impartiality and objectivity. Examples include a judge appearing unbiased in a court case, an auditor appearing independent in a financial audit, and a journalist appearing objective in their reporting.
For more information, view this lecture on Audit strategies for cloud and hybrid environments - part 1. Or visit this Wikipedia page.
Define:
Assessment
The evaluation process of systems, applications, or networks to identify and address vulnerabilities and weaknesses, examining people, processes, and technologies.
This refers to the evaluation of systems, applications, and networks to identify vulnerabilities, weaknesses, and potential improvements. This process typically involves examining an organization’s people, processes, and technologies. Assessments are critical for identifying security gaps and formulating remediation plans to mitigate the risk of threats and exploits.
For more information, view this lecture on Risk Management- Assessment Part 1.
Define:
Asset Tracking
The systematic monitoring of physical or digital assets to manage inventory and security.
Asset tracking involves using technologies like RFID, barcodes, or GPS to monitor the location, status, and movement of valuable resources within an organization. This process enhances operational efficiency by ensuring assets are well-managed, readily located, and properly maintained. It also supports inventory control and loss prevention by providing detailed records and real-time tracking information.
For more information, view this lecture on Asset tracking and hardware hardening. Or visit this Wikipedia page.
Define:
Asset Valuation
Determining the worth of an organization’s assets based on financial or operational impact, aiding in prioritizing security measures and investments.
The process of determining the financial or operational value of an organization’s assets. This can include hardware, software, data, or any other resource that supports business functions. The valuation helps in prioritizing resources for security investments, aligning them with the potential loss that could be incurred if the asset were compromised.
For more information, view this lecture on External dependencies in BIA. Or visit this Wikipedia page.
Define:
Asset-based Risk Perspective
Assessing security risks by analyzing potential threats to specific assets, focusing on vulnerabilities and impact to prioritize asset protection.
This involves assessing security risks based on the potential threats to specific assets within an organization. This approach identifies the vulnerabilities and threats specific to each asset and estimates the potential impact if a security incident were to occur. The focus is on protecting the most valuable or sensitive assets to minimize the overall risk to the organization.
Define:
Assurance
The level of confidence in the security measures implemented to protect systems and data, verified through audits, testing, and reviews.
The degree of confidence one has in the security measures implemented to protect an organization’s systems and data. It involves various practices, including regular audits, testing, and reviews, to verify that the implemented security controls are effective and that they meet the organization’s security objectives.
For more information, visit this Wikipedia page.
Define:
Assurance Engagement
An independent examination of an organization’s security controls to provide stakeholders with confidence in the entity’s security posture.
An examination conducted by an independent party to evaluate the effectiveness of security controls within an organization. The engagement typically includes a thorough review of systems and processes to provide stakeholders with a level of confidence in the security posture of the entity.
For more information, visit this Wikipedia page.