Domain 1 - Security & Risk Management Flashcards
Incident
Some sort of occurrence or event
Breach
An occurrence or event that has a negative outcome
A countermeasure being bypassed or rendered ineffective
Disclosure
Making ‘secret’ information ‘public’
Patent
A set of exclusive rights granted by a sovereign state to an inventor for a limited period of time (typically 20 years), in exchange for public disclosure.
Copyright
Protects published or unpublished original work (for the duration of the authors life, plus 50 years) from unauthorized duplication without due credit and compensation.
Trademark
A recognizable sign, design, or unique expression related to products or services of a particular source from those of others, usually called service marks.
Three major International intellectual-property protection treaties are…
Berne Convention
Universal Copyright Convention
WIPO Copyright Treaty
The five rights associated with a copyright
[ R A M P D ] Reproduce the work in any form, language, or medium Adapt or derive more works from it Make and distribute its copies Perform it in public Display it in public
International Traffic in Arms Regulations (ITAR)
What is considered exportable
Export Administration Regulations (EAR)
Under what conditions we can export
The Wassenaar Arrangement
Dual-use goods
What are the OECD Principles?
Organization for Economic Cooperations and Development
Eight Core Principles:
- Collections Limitation
- Data Quality
- Purpose Specification
- Use Limitation
- Security Safeguards
- Openness
- Individual Participation
- Data Controller Accountability
(ISC)2 Code of Professional Ethics
- Protect society, the commonwealth, and the infrastructure (Do no harm, Protect life FIRST)
- Act honorable, honestly, justly, responsible, and legally
- Provide diligently and competent service to principals
- Advance and protect the profession
“Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.”
Security Policy
Direction from senior management (Strategic)
Standard
Formalized
Procedure
Step-by-step method of accomplishing something (Tactical)
Guideline
Best Practice recommendation
Business Impact Analysis (BIA) goals
- Determine Criticality
- Estimate Maximum downtime
- Evaluate Internal and External Resource Requirements
Business Impact Analysis (BIA) process steps
- Gather requirements/info
- Vulnerability assessment
- Risk Analysis
+ QUANT-itative (ALE = SLE * ARO)
- Facts, numbers, money
+ QUAL-itative - Communicate findings
RTO
Recovery Time Objective
The amount of time that would be a sweet spot to get a system back online in.
RPO
Recovery Point Objective
Data or information that we are willing to walk away from in order to restore (Backup time)
Risk
The probability that a given threat sources will exercise a particular vulnerability and the resulting impact should that occur
Threat
An event or situation that if it occurred, would prevent the organization from operating in its normal manner
A potential occurrence that may cause an undesirable outcome
Vulnerability
Weakness
Likelihood
Chance that something might happen