Domain 1 (Security and Risk Management) Flashcards
What does CIA stand for?
Confidentiality, Integrity and Availability
What is the purpose of confidentiality?
Enforces secrecy
What is the purpose of integrity?
Accuracy, reliability of data
What are example controls that enforce confidentiality?
Encryption, Access control
What are example controls that enforce Integrity?
Hashing, Change Control
What are example controls that enforce availability?
RAID, backups
Definition of Vulnerability
System weakness that allow treat agent to compromise
Definition of Threat
Danger associated with exploiting vulnerability
Examples of a Treat Agent
Intruder, careless employee or bad policy
Definition of Risk
Likelihood of threat source exploiting vulnerability and its business impact
Definition of Exposure
Instance of being exposed to loss. Example: Weak Password
Definition of Control
Countermeasure to mitigate risk
What are the three control types?
Administrative, Technical and Physical
Examples of Administrative controls
Documents, training, management related
Examples of Technical controls
Firewall, encryption, IDS
Example of physical control
Fences
Definition of Defense-In-Depth
coordinated use of several controls in layered approach
Name the six control functions
Preventative, Detective, Corrective, Deterrent, Recovery and Compensating
What does a Preventative control function do?
Intend to avoid incident happening
What does a detective control function do?
Identify incident activities
What does a corrective control function do?
Fixes systems after incident
What does a deterrent control function do?
Discourages attackers
What does a recovery control function do?
Brings environment back to operation
What does a compensating control function do?
Alternative measure of control
Definition of Security Through Obscurity
Assume your enemies are not as smart as you are
Definition of Methodology
Process to follow to build architecture
Definition of Strategic Alignment
Business drivers being met by security
Definition of Business enablement
Core business processes are integrated into security model
What does a system architect do?
Structure of software
What does a enterprise architect do?
Structure of organization
What is computer assisted crime?
Computer used to carry out crime
What is computer targeted crime?
Computer was victim
What is computer incidental crime?
A computer happen to have been used in crime
Definition of Advanced Persistent Threat
Very focused and motivated attacker
Characteristics of Civil law system
Decide liability not guilt. Financial compensation
Characteristics of criminal law
Innocent until proven guilty. Punishment loss of freedom
Characteristics of Customary Law Systems
Based on tradition, Deals with personal conduct, Fine or community service
What is a mixed law system?
Mostly mix civil and common law
Characteristics of Administrative law
Regulatory standards for performance and conduct
Characteristics of Trade Secret
Qualify only if provides company with competitive edge. Must require skill, money effort develop. Proprietary.
Examples of a Trade Secret
Algorithms, source code, recipe
Characteristics of Copyright
Does not cover resource but expression of idea
Examples of Copyright
Drawing, music
Examples of Trademark
Work, symbol, sound
Characteristics of Patent
Excludes others from copying, lasts 20 years
What do you call non practicing entities that do not use patent?
Patent troll
What is Freeware
Can use and share
What is Shareware
Released for marketing
What is Personally Identifiable Information?
Data that can identify a single person
What is privacy?
The ability to control who has information about you
What is a Chief Privacy Officer?
Usually lawyer oversees how data managed
Name three privacy problems
Data aggregation, loss of borders, convergent technologies
What is a generic approach regulation?
Stretches across industries, also called horizontal enactment
Tip for Reasonable Exception of Privacy?
Tell staff they are being monitored
Definition of Threat?
Something that has the potential to cause harm
Quality of a safeguard?
It’s proactive
Quality of a Countermeasure?
It’s reactive
What is a Secondary Risk?
A risk that comes later as the result of another risk response