midterm rand Flashcards

1
Q

What was the effect of employee training on breach costs?

A

Organizations with high levels of employee training had breach costs USD 950,000 lower than those with low training levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What factor led to the biggest cost savings in preventing data breaches?

A

Extensive use of AI and automation in prevention, saving an average of USD 2.2 million.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much lower were breach costs when AI and automation were used in detection, investigation, and response?

A

Between 33-43% lower compared to organizations that didn’t use AI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of data breach was the most expensive?

A

Breaches involving public cloud data, costing USD 5.17 million on average.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of stored data took the longest to contain?

A

Public cloud data breaches, taking 23.3% longer than on-premises breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the definition of risk?

A

The effect of uncertainty on objectives​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk management?

A

Coordinated activities to direct and control an organization regarding risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three main components of risk?

A

Threat, vulnerability, and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat?

A

A potential cause of an unwanted incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is vulnerability?

A

A weakness that can be exploited by a threat​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is impact in risk management?

A

The consequences of an event affecting objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps in risk management?

A

Identify, assess, evaluate, treat, monitor, and review​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk avoidance?

A

A strategy to eliminate the risk by not engaging in the activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk reduction?

A

Taking actions to minimize the likelihood or impact of a risk​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk transfer?

A

Shifting the risk to a third party (e.g., insurance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ISO 31000 focus on?

A

Risk management principles, framework, and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk acceptance?

A

A decision to take no action and accept the potential consequences​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does ISO/IEC 27005 focus on?

A

Information security risk management​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the NIST Risk Management Framework (SP 800-37)?

A

A structured process integrating security and privacy risk management

19
Q

What is a control in risk management?

A

A measure taken to reduce risk

20
Q

What is qualitative risk analysis?

A

A subjective assessment of risk impact and likelihood

20
Q

What is inherent risk?

A

The risk level before any mitigation measures

21
Q

What is residual risk?

A

The remaining risk after risk treatment measures are applied

22
Q

What is risk aggregation?

A

The process of combining multiple risks for a holistic view​

23
Q

What is quantitative risk analysis?

A

A numerical approach to assessing risk

24
Q

What is an advanced persistent threat (APT)?

A

A prolonged cyberattack by a well-funded group​

25
Q

What is the MITRE ATT&CK framework?

A

A knowledge base of cyber adversary tactics and techniques

26
Q

What is an intrusion detection system (IDS)?

A

A system that monitors for malicious activity or policy violations

27
Q

What is an intrusion prevention system (IPS)?

A

A system that actively blocks detected threats​

28
Q

What is the principle of least privilege (PoLP)?

A

Giving users only the access they need to perform their jobs

29
Q

What is the difference between black-box and white-box testing?

A

Black-box: No internal knowledge. White-box: Full knowledge of system​

30
Q

What is the NIST Cybersecurity Framework (CSF)?

A

A framework providing guidelines for managing cybersecurity risk

31
Q

What are some common risk management standards?

A

ISO 31000, ISO/IEC 27005, NIST SP 800-39

32
Q

What is residual risk?

A

The remaining risk after implementing risk treatment measures

33
Q

What is a risk register?

A

A document listing identified risks, their severity, and mitigation strategies

34
Q

What is the difference between qualitative and quantitative risk analysis?

A

Qualitative is subjective, while quantitative assigns numerical values

35
Q

What does the NIS Directive define as risk?

A

Any reasonably identifiable event with a potential adverse effect on information systems​

36
Q

What is an example of a sector-specific risk management standard?

A

ISO 14971 for medical devices

37
Q

What is the Common Criteria (CC) framework used for?

A

Evaluating the security of ICT products​

38
Q

What is the EBIOS method?

A

A French risk assessment methodology

39
Q

What is the BowTie method?

A

A widely used qualitative risk analysis model

40
Q

What is ISO 31000 known for?

A

Risk management principles and guidelines

41
Q

What are ICT products?

A

ICT (Information and Communication Technology) products include hardware, software, and services used for communication, data processing, and information management

42
Q

Why are ICT products important in risk management?

A

They are essential for securing digital infrastructure, protecting data, and ensuring business continuity​

43
Q

Can you give examples of ICT products?

A

/Hardware: Computers, servers, networking devices, IoT devices
/Software: Operating systems, cybersecurity tools, cloud platforms
/Services: Cloud computing, cybersecurity solutions, data storage services