Domain 1 - Security and Risk Management Flashcards
The Following are elements of what Threat Assessment model?
Spoofing, Tampering, Repudiation, Information disclosure (privacy breach or data leak), Denial of service, and Elevation of privilege.
STRIDE
Which commercial business/private sector data classification is used to control information about individuals within an organization?
PRIVATE
Data classifications are used to focus security controls over what three areas?
Storage
Processing
Transfer
When seeking to hire new employees, what is the first step?
Create a job description
________ includes analyzing an environment for risks, evaluating each threat event as to its likelihood of occurring and the cost of the damage it would cause, assessing the cost of various countermeasures for each risk, and creating a cost/benefit report for safeguards to present to upper management
Risk Analysis
______ are accidental or intentional exploitations of vulnerabilities
Threat Events
A ______ is the absence or weakness of a safeguard or countermeasure.
Vulnerability
All of the following are valid definitions of what?
A. An assessment of probability, possibility, or chance
B. Risk = threat * vulnerability
C. Every instance of exposure
RISK
True / False
The annual costs of safeguards should not exceed the expected annual cost of asset loss.
TRUE
How is single loss expectancy (SLE) calculated?
SLE = Asset value ($) * exposure factor
How is the value of a safeguard to a company calculated?
ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard [(ALE1 – ALE2) – ACS]
What is the first step that individuals responsible for the development of a business continuity plan should perform?
Business organization analysis
Once the BCP team is selected, what should be the first item placed on the team’s agenda?
Business organization analysis
What is the broadest category of computer systems protected by the Computer Fraud and Abuse Act, as amended?
Systems used in interstate commerce
Intellectual Property protection is achieved through what?
Copyright