IC34M01 - Assessment Overview Flashcards
Waht are the four parts to defining scope?
- Identify Requirements
- Specify Devices
- Select collection Method
- Document
Name some benefits of Cybersecurity Risk Assessments
- Determine order or priority
- Define threats, vulnerabilities, and consequences
- Design and apply countermeasures
- Prioritize mitigation activities and resources
- Evaluate effectiveness versus cost of countermeasure procedures
What is produced in every step of the Cyber Risk Assessment Process?
Documentation
If you didn’t document your steps, there is nothing to verify, audit, or prove the findings of the assessment.
What are the four key concepts of scope?
- System Architecture Diagrams
- Network Diagrams
- Asset Assessment
- Criticality Assessment
What determines the parameters of what is included in the assessment and how it is performed?
1. Scope
2. Vulnerability
3. Threat
4. Documentation
Scope
Why conduct Cybersecurity Vulnerability Assessments?
1. To determine return on investment
2. To identify requirements for specific devices
3. To define, identify and classify vulnerabilities in systems&networks.
4. To collect data and document system diagrams
To define, identify and classify vulnerabilities in systems&networks.
Which key concept of Scope details a list of all elements in a system?
1. Asset Inventory
2. Criticicality Assessment
3. Network Diagram
4. System Architecture Diagram
Asset Inventory
Which is not a benefit of a Cybersecurity Risk Assessment?
1. Define threat, vulnerabilities & consequences
2. Design & apply countermeasures
3. Prevent audits by documenting procedures
4. Prioritize activities & resources for mitigation
Prevent audits by documenting procedures
Why should you partition the system under consideration into zones and conduits when conducting a cyber risk assessment?
1. To ensure the best possible protection
2. To practice by repeating the process for each zone & conduit
3. To determine the Security Level Target
4. To determine the residual cyber risk
To ensure the best possible protection