Domain 5.0: Governance, Risk, and Compliance Flashcards
generally, ___ deter, prevent, detect or correct. some ___ such as anti-malware, provide more than 1 of those functions
controls
a computer login notification is an example of a common ____ control
preventive
____ controls are used when a business or technological constraint exists and an alternate control is effective in the current security threat landscape
compensating
___, ___, ___ and ISA are types of interoperability agreements that help mitigate risk when dealing with 3rd parties
SLA (service-level agreement), BPA (business partners agreement), MOU (memorandum of understanding) (and ISA-interconnection security agreements)
user ___ require unique training and awareness. the user ____ include general users, privileged users, system admin, executive users, data owners and system owners. the last 3 are in positions that are responsible for creating or managing security policies
types
____ designates the amount of data that will be lost or will have to be reentered due to network downtime
RPO (recovery point objective)
____ designates the amount of time that can pass before a disruption begins to seriously impede normal business operations
RTO (recovery time objective)
___ is the average time before a product requires repair
MTBF (mean time between failures)
____ is the average time before a product fails and cannot be repaired
MTTF (mean time to fail)
a ____ ____ ___ determines whether systems contain personal information. a ____ ____ _____ is needed for any organization that collects, uses, stores, or processes such information
privacy threshold assessment
___ _____ is largely a function of threat, vulnerability and impact. it can be considered with this formula
____ = threat x vulnerability x impact
risk assessment
risk
____ _____ includes asset identification, risk assessment, threat identification and classification, and identification of vulnerabilities
risk identification
regarding risk, ____ measures are based on subjective values; they are less precise than ___ measures, which rely on numbers
qualitative, quantitative
an ____ ___ can be accepted, mitigated, transferred, or avoided. purchasing insurance is a common example of transferring risk
identified risk
____ = SLE (single loss expectancy) x ARO (annualized rate of occurrence)
used in quantitative risk assessment
ALE (annualized loss expectancy)
7 laptops stolen a year (ARO) x $1,000 (SLE) = $7,000 (ALE)