Domain 1: Security and Risk Management Flashcards
What does the term annualized loss expectancy (ALE) mean as it relates to a risk management program?
The ALE is a dollar amount that estimates the loss potential from a risk in the span of one year. The ALE is calculated by multiplying the ARO (annual rate of occurrence) multiplied by the SLE (single loss expectancy).
For example, if the SLE = $100 and the ARO = 0.1, the ALE is $100 × 0.1 = $10. This value is used to figure out the amount of money that should be earmarked to protect this asset from this threat.
What is copyright?
Copyright is a form of intellectual property that gives the creator of an original work exclusive rights for a certain time period in relation to that work, including its publication, distribution, and adaptation, after which time the work enters the public domain. Copyright applies to any expressible form of an idea or information that is substantive and discrete.
Why should organizational assets be classified?
Classifying organizational assets ensures that they receive the appropriate level of protection, and classifications indicate the priority of that security protection.
The primary purpose of data classification is to indicate the level of confidentiality, integrity, and availability protection that is required for each type of data set.
Classifying data allows a company to organize it according to its sensitivity to loss, disclosure, or unavailability. Once data is segmented according to its sensitivity level, the company can decide what security controls are necessary to protect different types of data.
Evidence can be categorized into several types. Among these are:
- best evidence
- secondary evidence
- direct evidence
- conclusive evidence
- opinions
- circumstantial evidence
- hearsay evidence
Define opinion evidence.
When a witness testifies, the opinion rule dictates that she must testify to only the facts of the issue and not her opinion of the facts. This is slightly different from when an expert witness is used, because an expert is used primarily for his educated opinion. Most lawyers call in expert witnesses to testify and help the defending or prosecuting sides better understand the subject matter so that they can help the judge and jury better understand the matters of the case.
What is maximum tolerable downtime (MTD)?
MTD is the longest outage time that can be endured by a company. The business impact analysis (BIA) identifies which of the company’s critical systems are needed for survival and estimates the outage time that can be tolerated by the company as a result of various unfortunate events.
Common MTD timeframes include the following:
- Nonessential: 30 days
- Normal: 7 days
- Important: 72 hours
- Urgent: 24 hours
- Critical: Minutes to hours
What are the four objectives of a disaster recovery plan (DRP)?
The objectives of the disaster recovery plan (DRP) usually include the following:
- Protecting an organization from major computer services failure
- Minimizing the risk to the organization from delays in providing services
- Guaranteeing the reliability of standby systems through testing and simulation
- Minimizing the decision making required by personnel during a disaster
The goal of disaster recovery is to minimize the effects of a disaster and take the necessary steps to ensure that the resources, personnel, and business processes resume operation in a timely manner.
What are the three primary components of information security that make up the security triad?
- Availability
- Integrity
- Confidentiality
These three components comprise the AIC triad The level of security required to accomplish these principles differs per company, because each has its own unique combination of business and security goals and requirements. All security controls, mechanisms, and safeguards are implemented to provide one or more of these principles, and all risks, threats, and vulnerabilities are measured for their potential capability to compromise one or all of the AIC principles.
What occurs during the plan design and development phase of the creating a business continuity plan (BCP)?
The team prepares and documents the detailed recovery plan, formulating methods to ensure systems and critical functions can be brought online quickly. They document procedures, recovery solutions, roles and tasks, and emergency responses.
What is a trade secret?
A trade secret is a confidential design, practice, or method that is proprietary. For a trade secret to remain valid, the owner must take certain security precautions. Trade secrets are deemed proprietary to a company and often include information that provides a competitive edge. The information is protected as long as the owner takes the necessary protective actions.
Evidence can be categorized into several types. Among these are:
- best evidence
- secondary evidence
- direct evidence
- conclusive evidence
- opinions
- circumstantial evidence
- hearsay evidence
Please define conclusive evidence.
Conclusive evidence is introduced to prove a fact that is supposed to be so conclusive that there can be no other truth as to the matter—evidence so strong it overpowers contrary evidence, directing a fact-finder to a specific and certain conclusion. Conclusive evidence is irrefutable and cannot be contradicted. Conclusive evidence is strong and does not require corroboration.
What are the roles in a data classification system that a person might take?
- Data owner
- Data custodian
- Data user
- Information systems auditor
The data owner is responsible for the protection of the data. The owner is typically a manager or executive in an organization and is responsible for the following:
- Making the original classification determination
- Reviewing the classification levels periodically
- Delegating the responsibility of the data protection duties to the data custodian
The data custodian is the technical caretaker of the data. Duties include:
- making backups
- restoring data
- implementing and maintaining countermeasures
- administering the access controls.
The data user refers to anyone who uses the data. Users must use “due care” when accessing data. They must ensure that the data is used only in accordance with allowed policy and abide by the rules set for the classification of the data. -
An Information systems auditor is responsible for providing reports to the senior management on the effectiveness of the security controls by conducting regular, independent audits.
What is the difference between quantitative risk analysis and qualitative risk analysis?
Quantitative risk analysis attempts to assign monetary values to assets and the impact of given risks to arrive at a quantifiable dollar value for each risk.
Qualitative risk analysis addresses more intangible values of a data loss and focuses on measures other than the pure hard costs.
Qualitative analysis does not assign numbers and monetary values to components and losses. Quantitative risk analysis attempts to assign real and meaningful numbers to all elements of the risk analysis process. Each element within the analysis (asset value, threat frequency, severity of vulnerability, impact damage, safeguard costs, safeguard effectiveness, uncertainty, and probability items) is quantified and entered into equations to determine total and residual risks. Qualitative methods walk through different scenarios of risk possibilities and rank the seriousness of the threats and the validity of the different possible countermeasures based on opinions.
There are three primary options for backing up data to tape:
- full
- incremental
- differential
Define the incremental backup option.
Incremental backup backs up all the files that have changed since the last full or incremental backup and sets the archive bit to 0. When the data needs to be restored, the full backup data is laid down and then each incremental backup is laid down on top of it in the proper order. If a company experiences a disaster and uses the incremental process, it first needs to restore the full backup on its hard drives and lay down every incremental backup that was carried out before the disaster took place. So, if the full backup was done six months ago and the operations department carried out an incremental backup each month, the restoration team would restore the full backup and start with the older incremental backups and restore each one of them until they were all restored.
What constitutes qualitative criteria evaluated in the vulnerability assessment component of the business impact analysis (BIA)?
Qualitative loss criteria can consist of the following:
- The loss of competitive advantage or market share
- The loss of public confidence or credibility, or incurring public embarrassment
- Employees unable to report to work due to damage to their personal assets (house, car, and so on)
Qualitative and quantitative impact information should be gathered and then properly analyzed and interpreted. The goal is to see exactly how a business will be affected by different threats. The effects can be financial, operational, or both.
In the (ISC)2 model, what step follows after the business impact analysis (BIA)?
Creating a recovery strategy.
The recovery strategy is a process for how to rescue the company after a disaster takes place. Recovery strategy processes integrate mechanisms such as establishing alternate sites for facilities, implementing emergency response procedures, and possibly activating the preventive mechanisms that have already been implemented.
According to the Internet Architecture Board’s (IAB) document “Ethics and the Internet” (RFC 1087), what activities are defined as unacceptable and unethical?
Any activity is defined as unacceptable and unethical that purposely:
- Seeks to gain unauthorized access to the resources of the Internet
- Disrupts the intended use of the Internet
- Wastes resources (people, capacity, computer) through such actions
- Destroys the integrity of computer-based information
- Compromises the privacy of users
A business continuity plan (BCP) needs to be part of all organizations’ security programs. Please describe a BCP and why it is important.
A BCP is a plan an organization develops to respond to unforeseen incidents, accidents, and disasters that can affect the normal operation of the organization’s critical functions. The critical processes of an organization need to be identified, protected, and redundant. The goal of a business continuity plan is to ensure that the organization can survive no matter what happens to it. The plan also involves dealing with customers, partners, and stakeholders through different channels until everything returns to normal.
After a business continuity plan (BCP) is in place, the plan must be continually maintained for it to be effective. What is the best way to maintain a BCP?
One of the simplest and most cost-effective and process-efficient ways to keep a plan up-to-date is to incorporate it within the change management process of the organization. The change management process should be updated to incorporate fields and triggers that alert the BCP team when a significant change will occur and should provide a means to update the recovery documentation. The BCP should also be tested periodically to ensure it still meets the needs of a changing business and technology environment.
Why is digital evidence commonly referred to as hearsay evidence?
It can be very difficult to determine if computer-generated material has been modified before it is presented in court. Since this type of evidence can be altered without being detected, the court cannot put a lot of weight on this evidence. Many times, computer-generated evidence is considered hearsay in that there is no firsthand proof backing it up.
Evidence can be categorized into several types. Among these are
- best evidence
- secondary evidence
- direct evidence
- conclusive evidence
- opinions
- circumstantial evidence
- hearsay evidence
Define direct evidence and show how it differs from circumstantial evidence.
Direct evidence is testimony and other types of proof that expressly or straightforwardly prove the existence of a fact. It is different from circumstantial evidence, which is evidence that, without going directly to prove the existence of a fact, gives rise to a logical inference that such a fact does exist. Direct evidence is evidence which, if believed, proves the existence of the fact in issue without inference or presumption. It is evidence that comes from one who speaks directly of his own knowledge on the main or ultimate fact to be proved, or who saw or heard the factual matters that are the subject of the testimony.
Extranets, VANs, and shared networks with external entities create what type of legal concern?
Downstream liability
Downstream liability can take place when companies that share network access, or other resources, with outside parties does not provide the necessary level of protection. If the company’s negligence affects the other company it is working with, the affected company can sue the upstream company.
What is a BIA?
The business impact analysis (BIA) describes what impact a disaster could potentially have on critical business functions, as well as evaluating the threats to these functions and the costs of a potential outage. Conducting a BIA is a functional analysis in which a team collects data through interviews and documentary sources; documents business functions, activities, and transactions; develops a hierarchy of business functions; and finally applies a classification scheme to indicate each individual function’s criticality level.
How does ISO 17799 relate to British Standard 7799?
ISO 17799 was derived from the British Standard 7799 (BS7799) The most commonly used standard for security program development and maintenance is ISO 17799, which was derived from the de facto standard, British Standard 7799 (BS7799). It is an internationally recognized information security management standard that provides high-level conceptual recommendations on enterprise security.
What are three possible factors that determine the value of an asset?
- Initial and outgoing cost of purchasing, licensing, and supporting the asset
- Value to the organization’s production operations
- Value in the external marketplace
The initial and ongoing cost of purchasing, licensing, and supporting the asset also includes the cost to acquire or develop the asset.
The asset’s value to the organization’s production operations is the determination of cost to an organization if the asset is not available for a certain period of time.
The asset’s value as established in the external marketplace includes the value the asset might have to competitors or what others will to pay for a given asset.