Play It Safe: Manage Security Risks Flashcards
Security Posture
An organizations ability to manage its defense of critical assets and data, and react to change
Security And Risk Management
Focused on defining security goals and objectives, risk mitigation, compliance, business continuity, and legal regulations
Risk Mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
Compliance
The primary method used to develop an organizations internal security policies, regulatory requirements, and independent standards
Business Continuity
An organizations ability to maintain their everyday productivity by establishing risk disaster recovery plans
Asset Security
Focused on securing digital and physical assets. Related to the storage, maintenance, retention and destruction of data
Security Architecture And Engineering
Focused on optimizing data security by ensuring effective tools, systems, and processes are in place to protect an organizations assets and data
Shared Responsibility
All individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security. Associated with Security Architecture and Engineering
Communication And Network Security
Focused on managing and securing physical networks
Identity And Access Management (IAM)
Focused on access and authorization to keep data secure, by making sure users follow established policies to control and manage assets
Components Of IAM
Identification, authentication, authorization, accountability
Identification
User verifies who they are by providing username, access card, or biometric data
Authentication
Verification process to prove a person’s identity by password or PIN
Authorization
Takes place after a user’s identity has been confirmed
Accountability
Monitoring or recording users actions like log-in attempts
Security Assessment And Testing
Focused on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats and vulnerabilities
Security Operations
Focused on conducting investigations and implementing preventative measures
Software Development Security
Focused on using secure coding practices
Secure Coding Practices
Recommended guidelines that are used to create secure applications and services
Software Development Lifecycle
An efficient process used by teams to quickly build software products and features
Information Security (InfoSec)
A set of processes established to secure information
InfoSec Design Processes
Indecent response, vulnerability management, application security, cloud security, and infrastructure security
Security Architecture And Engineering Design Principles
Threat modeling, least privilege, defense in depth, fail securely, separation of duties, keep it simple, zero trust and trust but verify
Threat
Any circumstance or event that can negatively impact assets
Risk
Anything that can impact the CIA of an asset
Low- Risk Asset
Information that would not harm the organizations reputation or ongoing operations, and would not cause financial damage if compromised. Ex- website content or published research data
Medium- Risk Asset
Information that’s not available to the public and may cause some damage to the organizations finances, reputation, or ongoing operations. Ex- early release of company’s quarterly earnings
High- Risk Asset
Information protected by regulations or laws, which if compromised, would have a severe negative impact on an organizations finances, ongoing operations, or reputation. Ex- leaked assets with SPII, PII or intellectual property
Vulnerability
A weakness that can be exploited by a threat
Layers Of The Web
Surface Web, Deep Web, and Dark Web
Surface Web
Generally used for browsing and shopping
Deep Web
Requires authorization to access. Ex- workplace intranet