Exam 1 Flashcards

1
Q
Which security principle is opposite of disclosure?
A) integrity
B) availability
C) confidentiality
D) authorization
A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Opposite of corruption?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Opposite of destruction?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Opposite of disapproval?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security policy

A

Administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCTV and locks

A

Physical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data backups

A

Technical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability?

A

An absence or weakness of a countermeasure that is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat?

A

Vulnerability is identified or exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat agent?

A

Entity that carries out a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exposure?

A

Organizational asset exposed to losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Countermeasure or safeguard?

A

Control that reduces risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of technical threats?

A

Hardware/ software failure
Malicious code
New technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Human threat agents?

A

Malicious and non malicious insiders and outsiders
Terrorists
Spies
Terminated personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Natural threat agents?

A
Floods
Fires
Tornadoes 
Hurricanes 
Earthquakes 
Other natural disaster or weather event
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Environmental threat agents?

A

Power or utility failure
Traffic issues
Biological warfare
Hazardous material issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SLE?

A

Single-Loss expectancy. Monetary impact of threat occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ARO

A

Annualized rate of occurrence. How often a threat may occur annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ALE

A

Annual lose expectancy. Expected risk factor of an annual threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EF

A

Exposure Factor. Percent value or or functionality loss after threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advisory security policies?

A

Instruction on acceptable and unacceptable activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Informative security policies?

A

Provide info on topics and act as educational tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Regulatory security policies?

A

Address specific industry regulations, including mandatory standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

System-specific security policies?

A

Address security for a specific computer, network, technology, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Computer assisted crime?

A

Computer used as a tool to help commit a crime

26
Q

Incidental computer crime?

A

Computer involved in a crime but not the victim or the attacker

27
Q

Computer targeted crime?

A

Computer is victim and the attacker means harm against the computer and its victim

28
Q

Computer prevalence crime?

A

Happen because computer are so widely used

29
Q

4 stages of security program lifecycle?

A
  1. Plan and organize
  2. Implement
  3. Operate and maintain
  4. Monitor and evaluate
30
Q

CSO?

A

Chief security officer. Responsible for security effort. Reports directly to CEO

31
Q

CPO?

A

Chief privacy officer. Responsible for private information. Reports directly to CIO

32
Q

CFO?

A

Chief financial officer. Responsible for all financial aspects of the organization

33
Q

Acceptable use policy?

A

Directive control. Lists proper procedures personnel must follow.

34
Q

Corrective controls?

A

Reduce effect of attack

35
Q

Detective controls?

A

Detect attack while occurring and inform proper authorities

36
Q

Compensative controls?

A

Sub for primary controls to mitigate risk

37
Q

Attacker centric threat model?

A

Profiles attackers characteristics, skills, and motivations to exploit vulnerabilities

38
Q

Application centric threat modeling?

A

Uses application diagrams to analyze threats

39
Q

Assets centric threat modeling?

A

Uses attack trees, attack graphs, or display patterns to determine how an asset can be attack.

40
Q

risk avoidance

A

terminating the risk factor or chosing something not as risky

41
Q

residual risk

A

the risk left over after safe guards

42
Q

risk transfer

A

is passing the risk on to a third party

43
Q

risk migration

A

is defining the acceptable risk level

44
Q

data owner

A

determine the classification level or the data

45
Q

data custodian

A

implements the classification to the data

46
Q

security administrator

A

maintains security devices

47
Q

corrective control

A

reduces the effect of an attack

48
Q

compensative control

A

substitute for primary access control

49
Q

preventive control

A

prevents an attack from happening

50
Q

zachmans framework

A

two dimensional model that intersects 6 communications and various veiwpoints

51
Q

what do employees sign to protect trade secrets

A

NDA or non-disclosure agreements

52
Q

due care

A

took all measures possible to prevent a security breach

53
Q

due diligence

A

investigated all vulnerabilities

54
Q

CRAMM?

A

CCTA Risk analysis and management method. Steps:

  1. Indemnify value and assets
  2. Identify threats and vulnerabilities and calculate risks
  3. Identify and prioritize countermeasures
55
Q

what not to worry about during a merger

A

the costs

56
Q

Information life cycle?

A
  1. Create/ receive
  2. Distribute
  3. Use
  4. Maintain
  5. Dispose/ store
57
Q

Data quality?

A

Fitness of data for use

58
Q

Data remanence?

A

Clearing
Purging
Destruction

59
Q

Media destruction?

A

Physical
Chemical
Magnetic

60
Q

primary objective during a security incident is

A

minimal disruption to the organizations mission

61
Q
Which framework uses six communication questions that intersect with six layers?
Six Sigma 
SABSA
ITIL
ISO/ISEC 27000 Series
A

SABSA

62
Q
Which of the following is a 2 dimensional model that intersects communication interrogatives with various viewpoints?
SABSA
Zachman framework
TOGAF
ITIL
A

Zachman framework