Domain 1 Security & Risk Management Flashcards
What is a vulnerability
A weakness in a system that could be potentially be exploited.
What is a Threat
Anything that can bring harm to a system
What is Impact
attempts to determine what the outcome of a successful exploitation would be
What is Likelihood
An additional input into the Risk equation outside of just threat and vulnerability
How likely successful exploitation of a vulnerability.
Quantitative risk analysis
always numerically based and tied directly back to money
Single Loss Expectancy
SLE = EF (Exposure Factor) X AV (Asset Value)
Asset Value
The value of the asset
Exposure Factor (EF)
% of the asset value (AV) due to a threat
Annualized Rate of Occurrence (ARO)
Frequency of threat occurrence per year
Annualized Loss Expectancy (ALE)
Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO)
Principle of least privileges
Aka Minimum Necessary Access
Individuals only be granted the access necessary to perform their required business functions
Applies to system configuration, firewall rule sets, etc…
Rotation of duties
force other people to be in charge of carrying out key tasks normally performed by another employee.
Separation of duties
limit risk associated with critical functions/transactions by requiring two parties to perform what one person could otherwise perform.
Risk Transfer
Involve 3rd party to help address the risk
Most common type is breach insurance.
Risk Avoidance
declining not to move forward with a project that introduces the unacceptable level of risk.
e.g. decommissioning of a deployed system.
Risk Mitigation
Take actions that decreases the risk
Reduce the risk to an acceptable level
Request for Information (RFI)
gather information about the available providers of the items or service being procured
Request for Proposal (RFP)
determine which provider will bid for the project, what their proposal looks like, and what the cost will be
Request for Quote (RFQ)
included as overall part of RFP
determining the cost a supplier/provider would charege
Business Partnership Agreement (BPA)
typically used when business operates legally as partnership
address things like ownership, profit/losses, and contributions
Memorandum of Understanding/Agreement (MOU/)
two organizations interconnect information systems/networks.
Interconnection Security Agreement (ISA)
technical security requirements with two organization connect
Supports MOU/MOA
Service Level Agreement (SLA)
force providers to agree to provide an acceptable level of security.
Operating Level Agreement (OLA)
Internal agreement that supports SLA
determines level of service required of internal departments in order to be able to fully satisfy the details of the SLA
Enterprise License Agreement (ELA)
govern how an organization that licenses large volume of software is allowed to use that software
Acceptable Use Policy (AUP)
catch all policy that tried to define both expected user behavior and prohibited user behavior
Risk
=Threat x Vulnerability
Exploit
Process of threat taking advantage of a vulnerability