Misc. CISSP Tables/Equations (Secondary) Flashcards

1
Q

Total Risk (TR)

A

TR=(AV)(threats)(vulnerabilities)
TR=AV*R
TR=CG+RR

AV -Asset Value
R -Risk
CG -Controls Gap
RR -Residual Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk (R)

A

R=Threat*vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Single Loss Expectancy (SLE)

A

Describes how much it would cost you if it happened just ONE time

SLE=AV*EF
AV -Asset Value
EF -Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Annualized Loss Expectancy (ALE)

A

How much will you lost per year

ALE=AVEFARO
AV -Asset Value
EF -Exposure factor
ARO -Annualized rate of Occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Annualized Rate of Occurrence (ARO)

A

Expected frequency with which a specific threat or risk will occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Seven steps of NIST Risk Management Framework

A

1) Prepare
2) Categorize
3) Select
4) Implement
5) Assess
6) Authorize
7) Monitor

*People Can See I am Always Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Model

A

1) Application
2) Presentation
3) Session
4) Transport
5) Network
6) Data Link
7) Physical

Forwards: All People Seem To Need Data Processing

Backwards: Please Do Not Toss Security Processes Asside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steps of the data lifecycle

A

1) Create
2) Classify
3) Store
4) Use
5) Share
6) Archive
7) Destroy

Consultants Can Send Use Some Attack Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five Steps of “Common Criteria” Validation

A

1) Describe Assets
2) Identify Threats
3) Analysis & Rating of Threats
4) Determination of Security Objectives
5) Selection of Functional Security Requirements

Don’t Insult Any Data Scientists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The incident Response Process

A

1) Detection
2) Response
3) Mitigation
4) Reporting
5) Recovery
6) Remediation
7) Lessons Learned

DRMRRRL (Drum Roll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process for Quantitative Risk Analysis

A

1) Inventory the Assets (use asset value)
2) Identify the Threats (use exposure factor)
3) Analyze the Threats (use single loss expectancy)
4) Estimate the potential loss (use annualized loss expectancy)
5) Research Countermeasures for each threat
6) Cost-Benefit Analysis

I Imagined An Enormous Rosiere Chicken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exposure factor (EF)

A

The percentage (%) of value an asset lost due to an incident, represented in a decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Safegaurd Evaluation

A

The process of determining whether a safeguard is cost effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controls Gap (CG)

A

The amount of risk reduced by implementing safeguards

CG=TR-RR

This is subtracted from the total risk to calculate the residual risk…

And vice versa (This can be added to the residual risk to calculate the total risk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Residual Risk (RR)

A

The risk that remains even with all conceivable safeguards in place. Often the deducible on an insurance policy)

RR=TR-CG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Value a safeguard

A

(ALE-ALE_SG)-ACS

ALE -Annualized Loss Expectancy (with no safegaurds/controls)
ALE_SG -Annualized Loss Expectancy with the safegaurd in place
ACS -Annual Cost of Safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Class A Fires

A

Caused by combustibles

Recommended suppression material: Water, soda acid (dry powder)

18
Q

Class B Fires

A

Caused by Liquids

Recommended suppression material: CO2, halon, soda acid

19
Q

Class C Fires

A

“Electrical Fires”

Recommended suppression material: CO2, halon

20
Q

Class D Fires

A

Burning Metals

Recommended suppression material: Dry Powder

21
Q

Class K fires

A

“Kitchen Fires”

Recommended suppression material: Wet Chemicals (not water)

22
Q

CO2 as fire suppression material

A

Does not require clean up after use

Puts out fires by removing oxygen, not heat

Recommended for Class B fires “Burning Liquids” and for Class C fires “Electrical fires”

23
Q

Halon as fire suppression material

A

any of a number of unreactive gaseous compounds of carbon with bromine and other halogens, used in fire extinguishers

Recommended for Class B fires “Burning Liquids” and for Class C fires “Electrical fires”

24
Q

Dangers of using water as a fire suppressant

A

In Kitchen fires (Class K) it can allow grease to splash, allowing the fire to spread

In metal fires (Class D) it can separate into hydrogen and hydroxide. The hydrogen gas is combustible

In liquid fires (Class B) it can allow the burning liquid to splash, allowing the fire to spread

25
Q

Static voltage required to destroy sensitive circuits and components

A

40 Volts

26
Q

Static voltage required to scramble monitor displays

A

1 kV

27
Q

Static voltage required to destroy harddrive data

A

1.5 kV

28
Q

Static voltage required to cause an abrupt system shutdown

A

2 kV

29
Q

Static voltage required to cause permanent damage to a circuit

A

17 kV

30
Q

The only wiring type the is impervious to EMI

A

Fiber Optic

31
Q

Wiring types in order of their susceptibility to EMI

A

MOST effected to LEAST effected

10BaseT (UTP)
100BaseT
1000BaseT
10Base2
STP
10Base5
Fiber Optic

*As a general rule, the easier the cables are to install, the more effected they are going to be by EMI
*UTP is unshielded twisted pair

32
Q

Wiring types in order of their cost/difficulty to install

A

LEAST difficult/expensive to MOST difficult/expensive

10BaseT (UTP)
100BaseT
1000BaseT
10Base2
STP
10Base5
Fiber Optic

*As a general rule, the easier the cables are to install, the more effected they are going to be by EMI
*UTP is unshielded twisted pair

33
Q

Wiring types in order of the length you can use

A

Fiber-optic (2 km)
10Base5 (500 m)
10Base2 (185 m)
10BaseT (100 m)
STP (100 m)
100BaseT (100 m)
1000Base (100 m)

34
Q

Wiring types in order of the max speed you can get

A

Fiber-optic (2 Gbps)
1000BaseT (1 Gbps)
STP (155 Mbps)
100BaseT (100 Mbps)
10Base2 (10 Mbps)
10Base5 (10 Mbps)
10BaseT (10 Mbps)

*The names are based on how many Mbps you get from that cable

35
Q

File Transfer Protocol Details

A

TCP
Ports 20/21

36
Q

Secure Shell

A

TCP
Port 22

37
Q

Examples of Logical Controls in Physical security

A

These are technical controls
-Intrusion Detection
-Alarms
-CCTV
HVAC
-Fire Detection and Supression

38
Q

Examples of Administrative controls in physical security

A

Facility construction
Facility Selection
Site Management
Personnel Controls
Awareness Training
Emergency Response

39
Q

Physical Controls in physical security

A

-fencing
-lighting
-locks
-construction matrtials
-mantraps
-dogs
-gaurds

40
Q

The importance of physical security

A

*there is no security without physical security

The technology is not enough

If you don’t control the physical environment, then an attacker can walk in and place a wire tap, destroy your hardware, or cut the power to your systems

41
Q

Importance of Humidity controls

A

Should be between 40% and 60%

Too much humidity can cause corrosion. Too little humidity causes static electricity.

42
Q
A