Governance, Risk and Compliance Flashcards
Types of controls categories (3)
Managerial, technical, operational
Difference between managerial and operational controls
Managerial is high-level risk management, assesment and mitigation plans, usually at the policy, plan and procedure level.
Operational is targeted to employee’s day-to-day operations, including physical security.
AUP
Acceptable Use Policy
Risk formula
Probability times impact
SLE
Single Loss Expectancy
EF
Exposure Factor
Define Exposure Factor
cost of theat event divided by value of asset
Define SLE
cost of a threat event (value * EF)
ARO
Average Rate of Occurence
ALE
Average Loss Expectancy
Define ALE
The Average Loss Expectancy is the SLE * ARO
MTTF
Mean Time to Fail (one-time)
RTO
Recovery Time Objective
RPO
Recovery Point Objective
Ways to handle risk (3 + 2)
Mitigation, Acceptance and Transference + Avoidance and Deterrence
Change Management
Evaluation the impact of changes in the system as a whole
DLP
Data Loss Prevention
Two locking doors with a space between them
Mantrap
Cold vs Warm vs Hot Site
Cold is only backup space, with no IT infrastructure, needs equipment. Warm already has office space and critical IT equipment. Hot is ready to go with all infrastructure and systems needed.
Disaster Recovery Sites can be either ____ or _____
shared or exclusive
Incremental vs Differential Backup
Differential only saves files changed since the last full backup (only requires one delta), incremental are several deltas.
BCP
Business Continuity Plan
DRP
Disaster Recovery Plan
BIA
Business Impact Analysis
BCP uses ____ to determine impact of down or lost systems
BIA
RAID 0
Striping
RAID 1
Mirroring
RAID 5
Striping + Parity
RAID 6
Striping + Double Parity
RAID 10
Striping + Mirroring
RAID 5 requires at least _ disks
3 disks
RAID 10 requires at least _ disks
4 disks
CIA
Confidentiality, Integrity and Availability
Security posture
baseline
Threat assessment
Only identifies threats, part of risk assessment
Vulnerability assessment
Identifies vulnerabilities, and therefore threats and risks, part of risk assessment
Banner grabbing
Used for service recognition during port or vulnerability scans
Scan from an administrative account
Credentialed scan
Scan as an unauthorized user
Non-credentialeed scan
XSRF/CSRF
Cross-site request forgery