Domain 1.2: Security and Risk Management Flashcards
Review key terms related to governance, risk, compliance, and security principles.
Define:
Quality Assurance
(QA)
The practice of ensuring products or services meet quality requirements and are free from defects through systematic processes.
A systematic process of ensuring that products and services meet specified requirements and are reliable, defect-free, and fit for purpose. QA practices involve the implementation of standards, testing, and review to uphold product quality and customer satisfaction.
For more information, visit this Wikipedia page.
Define:
Quality Management System
(QMS)
A formalized system documenting processes, procedures, and responsibilities for achieving quality policies and objectives.
A framework of policies, procedures, and processes that are used to plan, implement, and monitor the quality of a product or service. It is used in organizations to ensure customer satisfaction and compliance with standards. Examples include ISO 9001, CMMI, and Six Sigma.
For more information, visit this Wikipedia page.
Define:
Quantitative Risk Analysis
The process of measuring the potential impact of identified risks using numerical values, aiding in risk prioritization.
A systematic process used in risk management that quantifies the probabilities and potential consequences of risks. It typically involves the calculation of risk through the formula - Risk = Probability of Occurrence × Impact of Event. This technique allows organizations to assign monetary values to risks and to prioritize them based on their potential to affect business outcomes.
For more information, view this lecture on Risk Management- Assessment Part 2. Or visit this Wikipedia page.
Define:
Quarantine Processing
Isolating potentially malicious data or software to prevent it from spreading or causing damage within a system.
The isolation of potentially infected or malicious data or software from the rest of a system or network in order to prevent it from spreading or causing damage. It is used in cybersecurity to protect networks and systems from malware and other forms of cyberattack. Examples include using virtual machines or sandboxes to run untrusted software, using intrusion detection systems to identify and block suspicious traffic, and implementing access controls to prevent unauthorized access to quarantined data or systems.
For more information, view this lecture on Risk- Attackers and Types of Attacks Part 2. Or view this lecture on Malware- Part 1.
Define:
RACI Chart
(Responsible, Accountable, Consulted, and Informed)
A matrix used to define roles and responsibilities in a project, ensuring clarity and accountability for tasks.
A matrix used to define roles and responsibilities within a project or team. It is used in the field of project management to ensure that all stakeholders are aware of their roles and responsibilities and to avoid confusion or conflict. Examples include the use of RACI charts to assign tasks and deadlines, the use of RACI charts to track progress and issues, and the use of RACI charts to communicate roles and responsibilities to all stakeholders.
For more information, view this lecture on RACI charts (Responsible, Accountable, Consulted, Informed). Or visit this Wikipedia page.
Define:
Reasonable Actions
Actions that are deemed suitable in a given situation based on a standard of reasonableness, including proper security measures.
Actions that are considered appropriate given the specific circumstances and are based on common sense and sound judgment. It is used in information security to determine the necessary measures that need to be taken to protect data and systems from potential threats. Examples include implementing multi-factor authentication, conducting regular security assessments, and implementing robust access controls.
Define:
Reducing Rrisk
Identifying, assessing, and taking steps to mitigate risks in order to protect an organization from potential threats.
The process of identifying, assessing, and mitigating risks in order to protect an organization from potential threats and vulnerabilities. Reducing risk is an important part of cybersecurity, as it helps organizations prevent, detect, and respond to potential security incidents. Examples of risk reduction strategies include implementing strong passwords, conducting regular security audits, and implementing security awareness training for employees.
For more information, view this lecture on Risk Management- Assessment Part 1. Or view this lecture on Risk Management- Assessment Part 2. Or visit this Wikipedia page.
Define:
Regulation
A rule or directive made and maintained by an authority, governing activities in various sectors to ensure safety, fairness, and compliance.
A rule or directive issued by a government agency to control or influence an industry or activity. It is used to protect the public interest and ensure compliance with standards and requirements. Examples include HIPAA, which regulates the use and disclosure of personal health information, and PCI DSS, which sets standards for securing payment card data.
For more information, view this lecture on Laws and Regulations. Or visit this Wikipedia page.
Define:
Regulatory Policy
(in IT and Cybersecurity)
Guidelines and practices that define how organizations comply with regulations related to technology and data security.
Guidelines and practices that govern how organizations comply with laws and regulations related to information technology and data security. These policies help ensure that organizations meet specific industry standards, like GDPR for data protection and Sarbanes-Oxley for financial reporting, to protect consumer data and maintain privacy.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks.
Define:
Regulatory Requirements
Mandated actions or conditions organizations must fulfill to adhere to legal and regulatory standards.
Obligations that organizations need to meet to comply with relevant laws, regulations, or standards set by governmental or oversight bodies. These requirements often pertain to data privacy, financial reporting, operational safety, and similar critical aspects within an organization’s operations. Non-compliance can result in legal consequences, fines, or damage to reputation, emphasizing the necessity of compliance management systems to ensure these requirements are met.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks. Or view this lecture on Laws and Regulations. Or visit this Wikipedia page.
Define:
Relationship between Policies, Procedures, Standards, and Guidelines
The hierarchy of governance documents where policies state goals, procedures provide steps, standards define requirements, and guidelines suggest best practices.
A hierarchy of rules that govern an organization’s operations. A policy is a high-level plan that outlines organizational goals. Procedures are detailed steps that describe how to accomplish these goals. Standards are established requirements that ensure procedures are performed consistently and correctly. Lastly, guidelines are recommendations that provide a framework for decision-making within the policy and procedural constraints.
For more information, view this lecture on Information Security Governance: Policies, Procedures, Guideline, and Frameworks.
Define:
Relationship between Threats, Vulnerabilities, Assets, and Risks
Interconnected elements where assets have value, threats may harm them, vulnerabilities could be exploited by threats, and risks are the potential for loss.
Threats, vulnerabilities, assets, and risks are interrelated components of risk management. An asset is something of value to an organization. A threat is a potential event that could cause harm or damage to the asset. Vulnerability refers to the weaknesses in a system or process that could be exploited by threats. Finally, risk is the potential for loss or damage when a threat exploits a vulnerability. Therefore, risk arises from the combination of the asset’s vulnerabilities, the threats it faces, and the impact the realization of these threats would have on the organization.
For more information, view this lecture on Risk Management- Assessment Part 1.
Define:
Relevant Information
Data that is directly related to the issue at hand, essential for making informed decisions or solving problems.
Data or facts that are directly related to the matter at hand and have the potential to affect the outcome of a decision. In a data analysis or troubleshooting process, for example, relevant information could be specific error messages, system logs, or user feedback that can help pinpoint the root cause of an issue or guide the implementation of a solution.
Define:
Reliable Information
Accurate and consistent data that can be depended on for decision-making and operations.
Data or facts that are accurate, consistent, and verifiable. It is free from error and bias and is trusted to make decisions. The reliability of information can be ensured through various methods, such as data validation, cross-referencing with multiple sources, and regular updates to ensure it remains current.
Define:
Representation
(in IT and Cybersecurity)
Using symbols or models to depict data or processes, essential for clear communication and data protection.
The depiction of data or processes through understandable symbols or models, for example, using visual schematics to represent network structures or encoding data in formats that ensure confidentiality and integrity. Accurate representation is vital for effective analysis, communication, and protection of IT assets.
Define:
Reputation Risk
Potential harm to an entity’s reputation from events or actions that could result in trust loss from stakeholders or the public.
The potential damage to the standing of an individual or entity due to a particular event, action, or inaction, which could result in a loss of trust among stakeholders, customers, or the public. In terms of security, it’s the risk of damage to a company’s reputation that could result from a data breach, system failure, or other security incident. Managing this risk involves a combination of proactive security measures, effective incident response, and communication strategies.
For more information, view this lecture on Risk Management - Identification. Or view this lecture on GRC - Governance, Risk Management, and Compliance. Or visit this Wikipedia page.
Define:
Residual Risk
The remaining risk after security measures are applied, evaluated for acceptable risk levels within risk management.
The amount of risk that remains after all security measures and controls have been applied. It represents the potential for harm, loss, or disruption even after all mitigations have been taken into account. Understanding and managing residual risk is a key part of any risk management strategy, as it helps determine whether additional measures are necessary or whether the remaining risk is acceptable.
For more information, view this lecture on Risk Management- Assessment Part 1. Or view this lecture on GRC - Governance, Risk Management, and Compliance. Or visit this Wikipedia page.
Define:
Resource
(in IT and Cybersecurity)
Any asset supporting information processes, such as hardware, data, and access controls.
Any digital asset that supports information processes and services, such as hardware, software, information, network capacity, and user access. Effective management of these resources is essential to ensure they are used securely and efficiently to achieve business objectives.
Define:
Resource Optimization
Improving resource use to achieve effective outcomes, crucial in operations and project management.
The process of maximizing the efficiency and effectiveness of resources to achieve desired results. It is used in operations management and project management to ensure that resources are used in the most effective and efficient manner. Examples include reducing waste and costs in production processes, minimizing downtime and disruptions in supply chain operations, and maximizing the use of available time and resources in project planning and execution.
Define:
Return on Investment
(ROI)
A measure used to evaluate the efficiency or profitability of security investments relative to their cost.
A performance measure used to evaluate the efficiency or profitability of an investment or to compare the efficiency of a number of different investments. In a security context, ROI could refer to the benefits gained from investments in security measures weighed against their cost. It helps organizations justify the necessity of security expenditures by demonstrating their value in terms of risk reduction, loss prevention, and compliance.
For more information, view this lecture on Administrative personnel controls.. Or visit this Wikipedia page.
Define:
Review/Approval
A process in change management for evaluating proposed changes and deciding whether they should be implemented.
This phase in change management involves a comprehensive evaluation of proposed changes and the decision of whether to authorize their implementation. The process includes assessing potential risks, benefits, costs, and resource requirements of the change. Scrutiny at this stage is critical from a security standpoint to confirm that changes will not introduce vulnerabilities, weaken existing controls, or negatively impact the security posture of the system.
Define:
RFC 1087, titled “Ethics and the Internet”
A document highlighting the importance of ethical behavior in internet use and condemning activities such as unauthorized access and hacking.
A document issued by the Internet Activities Board (IAB) that outlines unethical behaviors in the scope of internet use, including malicious activities like hacking and the unauthorized access to systems. RFC 1087 underscores the importance of responsible usage, respect for the rights of users, and the preservation of the integrity of the underlying infrastructure.
For more information, view this lecture on The ISC2 Code of Ethics.
Define:
Right-to-Audit
A contractual provision allowing review of an organization’s security and compliance practices.
Right-to-audit is a legal and contractual clause that grants one party, typically a customer or partner, the authority to inspect the systems, policies, and controls of another organization. This ensures transparency and adherence to established security, financial, or regulatory standards. It plays a crucial role in maintaining trust, verifying compliance, and identifying potential risks in outsourced operations.
Define:
Risk
The potential for loss or damage when a threat exploits vulnerability, fundamental in cybersecurity and risk management.
The potential for loss or damage resulting from a threat or vulnerability. It is a fundamental concept in cybersecurity and risk management, used to identify and evaluate potential threats and vulnerabilities. Examples include the risk of a cyber-attack on an organization’s network or the risk of data loss due to a natural disaster.
For more information, view this lecture on Risk Management- Assessment Part 1. Or visit this Wikipedia page.