Module 1 - 02-2 Flashcards
Navigate threats, risks, and vulnerabilities
Define Asset
An item perceived as having value to an organization
Define Threat
Any circumstance or event that can negatively impact assets
Define Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables
Define Phishing
A technique that is used to acquire sensitive data, such as user names, passwords, or banking information
True or False?
Phishing exploits human error to acquire sensitive data and private information.
True
Phishing exploits human error to acquire sensitive data and private information. It is one method of social engineering.
Define Risk
Anything that can impact the confidentiality, integrity, or availability of an asset
A basic formula for determining the level of risk is that risk equals the likelihood of a threat.
How would an organization rate risks at different levels (3)?
- Low
- Medium
- High
depending on possible threats and the value of an asset
Define Low-Risk Asset
Information that would not harm the organization’s reputation or ongoing operations, and would not cause financial damage if compromised
What are examples of Low-Risk Asset (2)?
- Public information such as website content
- Published research data
Define Medium-Risk Asset
Information that’s not available to the public and may cause some damage to the organization’s finances, reputation, or ongoing operations
What is an example of Medium-Risk Asset?
The early release of a company’s quarterly earnings could impact the value of their stock
Define High-Risk Asset
Information protected by regulations or laws, which if compromised, would have a severe negative impact on an organization’s finances, ongoing operations, or reputation
What are examples of High-Risk Asset (3)?
This could include leaked assets with SPII, PII, or intellectual property
Define Vulnerability
A weakness that can be exploited by a threat
What two factors must be present for there to be a risk?
Both a Vulnerability and a Threat must be present for there to be a Risk
What are examples of Vulnerabilities (4)?
- An outdated firewall, software, or application
- Weak passwords
- Unprotected confidential data
- People
Define Ransomware
A malicious attack where threat actors encrypt an organization’s data then demand payment to restore access
What are the Layers of the Web (3)?
- Surface Web
- Deep Web
- Dark Web
What is the Top Layer of the Web?
Surface Web
What is the Middle Layer of the Web?
Deep Web
What is the Bottom Layer of the Web?
Dark Web
Define Surface Web
The surface web is the layer that most people use.
It contains content that can be accessed using a web browser.
Define Deep Web
The deep web generally requires authorization to access it.
An organization’s intranet is an example of the deep web, since it can only be accessed by employees or others who have been granted access.
Define Dark Web
Lastly, the dark web can only be accessed by using special software.
The dark web generally carries a negative connotation since it is the preferred web layer for criminals because of the secrecy that it provides.
What are the three key impacts of threats, risks, and vulnerabilities?
- Financial
- Identity theft
- Reputation
Explain the Financial Impact on how it relates to threats, risks, and vulnerabilities
o When an organization’s assets are compromised by an attack, such as the use of malware, the financial consequences can be significant for a variety of reasons.
o These can include interrupted production and services, the cost to correct the issue, and fines if assets are compromised because of non-compliance with laws and regulations.
Explain the impact on how Identity Theft relates to threats, risks, and vulnerabilities
o Organizations must decide whether to store private customer, employee, and outside vendor data, and for how long.
o Storing any type of sensitive data presents a risk to the organization.
o Sensitive data can include personally identifiable information, or PII, which can be sold or leaked through the dark web.
o That’s because the dark web provides a sense of secrecy and threat actors may have the ability to sell data there without facing legal consequences.
Explain the impact on how Reputation relates to threats, risks, and vulnerabilities
o A solid customer base supports an organization’s mission, vision, and financial goals.
o An exploited vulnerability can lead customers to seek new business relationships with competitors or create bad press that causes permanent damage to an organization’s reputation.
o The loss of customer data doesn’t only affect an organization’s reputation and financials, it may also result in legal penalties and fines.
What does NIST stand for?
National Institute of Standards and Technology (NIST)
What is does National Institute of Standards and Technology (NIST) provide?
Frameworks that are used by security professionals to manage risks, threats, and vulnerabilities
What does RMF stand for?
Risk Management Framework (RMF)