IT Risk And Responses Flashcards
The overall process for understanding how risks can be identified and addressed in IT is through the:
Security life cycle
Examples of some technology risks that disrupt a business are:
Security risks - deal with hackers or employee abusing access
Availability risks - “the systems down”
Operational risks - not having correct software, or not using correct software effectively
Financial risk - using company printer for personal use
Compliance risk - HIPA laws, etc.
Strategic risk - misalignment with business and IT strategies
Four types of IT threats
Natural and political disasters
Errors in software and equipment malfunction
Accidental actions - human error
Intentional actions - fraud
What are the two categories of IT controls?
General controls - focus on broader IT infrastructure and environment
Application controls - focus on specific applications and transaction processing
Ensure that an organizations control environment (people, processes, and IT) is stable and well-managed. Common components of general IT controls include:
System development life-cycle standards and controls
Physical and logical controls over infrastructure
Business resiliency management
Change management procedures
Software acquisition, development, operations, and maintenance controls
Software specific mechanisms within a computer program that manage use access, permissions, and functionality. Application controls ensure transactions and data processed through a computer are:
Accurate
Complete
Valid
Authorized
An IT control can serve one of three functions:
Preventative
Detective
Corrective
Examples of preventative controls are:
Hire competent people
Segregation of duties
Physical access controls
Firewall/antivirus software
Example of detective controls:
Bank recon Surveillance cameras intrusion detection systems Change controls Log management and system monitoring Alerts when incidents occur and track them
Example of corrective controls:
Applying operating system upgrades
Maintaining data and system backups
Fixing data entry or transaction errors
Utilize software no protocols to monitor and control access to information and organizations IT infrastructure, typically built into software packages and enforce security measures for access.
Logical access controls
Authentication controls which is the specific access level or clearance granted based on their job. Examples of authentication controls are:
Passwords PIN number Biometrics Smart cards or physical tokens Push notification CAPTCHA (select all pictures that include bridges) Multifactor authentication
This control has authorization that restrict access and actions of authenticated users based on granted permissions
Access control list
Works in conjunction with a firewall that monitor network activities for malicious activities.
Intrusion detection systems (IDS)
This controls is in place for organizations using operating systems that need to be reviewed when installed and on an ongoing basis to ensure proper authorization and usage:
Vulnerability controls