Phy Sec - Imp Q Flashcards
Based on what principle Asset protection increases
ESRM
What is Security’s prime objective
To manage risks by balancing the cost of protection measures with their benefit
Critical requirement for successful ESRM adoption
Alignment of security strategy with the organizations overall strategy
Who is responsible for security risk
Asset owner
Key risk for all organizations
Cyber/Information Security
ESRM Cycle
Identify and Prioritize asset
Identify and Prioritize Risks
Mitigate prioritized risks
Continuous improvement
Asset Prioritization
Asset criticality
Risk Prioritization
Risks Potential
Risks are mitigated
In order of priority
To manage risk effectively
Security professional would eliminate or reduce the total number of incidents leading to loss
A goal of risk management is to
Manage loss effectively at the least cost
Comprehensive assets protection strategy
Based on strategy risk management approach
Risk Management
It is a systematic and analytical process by which an organization identifies, reduces and controls its potential risks and losses
Considering Assets
The first step in risk assessment is identification and valuation of assets/identifying the business’s assets (Although this step is frequently overlooked)
Threats fall into three categories
Intentional
Natural and
Inadvertent
Vulnerability is viewed as
A security weakness or gaps in an asset’s protection
Definition of Vulnerability
A weakness or organizational practice that may facilitate or allow a threat to be implemented or increase the magnitude of a loss threat.
A vulnerability is a weakness or business practice that can be exploited by an adversary or that makes an asset susceptible to damage from natural and inadvertent threats
Risk analysis
Process of identifying potential areas of loss and implementing countermeasures to mitigate probability of loss
Non linear junction detector
It is portable listening device and detect bugs even when they are turned off or malfunctioning
Risk mitigation
Several concepts support risk mitigation strategies. The four Ds , the five avenues to address risk and layered security
4 Ds of physical security
Deter
Detect
Delay
Deny
Detection
It can done by using surveillance and intrusion detection systems or even a management system that is located on the outermost defensive layer to provide the earliest detection