Domain 3 -InfoSec Governance & Risk Mgt Flashcards
A potentially negative occurrence
Threat
The cost of loss due to risk over a year
Annualised Loss Expectancy (ALE)
A weakness in a system
Vulnerability
A matched threat and vulnerability
Risk
A measure taken to reduce risk
Safeguard
The cost of a safeguard
Total Cost of Ownership
Money saved by deploying a safeguard
Return on Investment - ROI
If your annual TCO is less than your ALE then you have positive ROI and have made a good choice. If the TCO is higher than ALE, you have made a poor choice.
Cornerstone concept of information security that seeks to prevent unauthorised disclosure of information
Confidentiality
Cornerstone concept of information security that seeks to prevent unauthorised modification of information
Integrity
Cornerstone concept of information security that ensures information is available when needed
Availability
Unauthorised disclosure of information
Disclosure
Unauthorised modification of information or data
Alteration
Making systems unavailable
Destruction
Is a claim of who you are
Identity / identification
Proving an identity claim
Authentication
Describes the action you can perform on a system once you have identified and authenticated
Authorisation
Holds user accountable for their actions
Accountability
Means a user cannot deny (repudiate) having performed a transaction
Non-repudiation
You must have both authentication and integrity to have non repudiation. True or False?
True
Means a user should be granted the minimum amount of access (authorisation) required to do his job, but no more
Least privilege
Means a user can access data if he has business need todo so.
Need to know. User must need to know that specific piece of information before accessing it.
Is a layered defences that applies multiple safeguards (also called controls or measures taken to reduce risk) to protect an asset
Defence in depth. All controls can fail and sometimes multiple controls will fail. Deploying a range of different defence in depth safeguards lower the chance that all controls will fail
Assessing risk
Risk analysis
Valuable resources you are trying to protect. Eg. Data, systems, buildings, property etc.
Assets.
The value or criticality of the assets will dictate what safeguards to deploy. People are your most valuable nasset.
A potentially harmful occurrence. Eg. Earthquake, power outage, network based worm.
Threat. A negative action that may harm a system.
Threat * vulnerability
Risk
A weakness that allows a threat to cause harm
Vulnerability
The severity of the damage
Impact
Threat * vulnerability * impact
Risk. When calculating risk using the formula, any risk including loss of human life is extremely high, and must be mitigated.
Allow you to perform qualitative risk analysis based on likelihood ( from rare to almost certain ) , consequences (or impact) from insignificant to catastrophic
Risk Analysis Matrix
It uses a quadrant to map the likelihood of a risk occurring against the consequences or impact the risk would have.
Allows you to determine the annual cost of a loss due to a risk as well as allows you to make informed decisions to mitigate the risk
Annualised Loss Expectance - ALE