Risk Management Flashcards

1
Q

Risk Acceptance

A

• cost of other risk management options like “risk avoidance” may outweigh the cost of the risk itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Avoidance

A
  • Avoids any exposure to risk.

* Most expensive Risk mitigation option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Limitation

A

• Used to balance a bit of risk acceptance along with a bit of risk avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Transfer

A
  • Transfer of Risk to a willing third party.

* eg: Insurance company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory Access Control

A

• MAC
• Strictest Control
• Primarily used by the Government and military
• Enforces System administer-defined Access Controls to all controlled resources.
• secures information by assigning sensitivity (security level) labels on information.
Eg: Classification - top-Secret, Secret, confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discretionary Access Control

A
  • DAC allows each user to control access to their own data. Eg: file permissions
  • Uses an ACL to decide which users or group of users have access to information.
  • The owner of information is able to change the ACL permissions at his discretion.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Discretionary Access Control

A

• also known as RBAC - role based access control
• Access is based on users job function within an organization.
• Rules are set by Admin
• Rule-based, Role-based, or both
• Object owner is the organization, not the user.
Eg of RBAC - is allowing an analyst to read logs, but not change configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Principle of least Privilege

A
  • The principle of least Privilege states that all users should be granted only the level of privilege they need to do their jobs.
  • As needed approach to authorizing access.
  • Time based Access
  • Authorizes the lowest Privilege required to perform duties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Separation of duties

A
  • An administrative control that dictates that a single individual should not perform all critical or privilege level duties.
  • Prevents fraud and error.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM

A
  • Security Information And Event Management
  • Used by Security analysts to monitor the Enterprise
  • It aggregates and correlates various data feeds such as discovery and vulnerability assessment systems, risk and compliance, log management systems, penetration testing tools, Firewalls, IPS, Netflow, threat intelligence feeds, etc in a single pane for analysts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SOC

A
  • Security Operation Center
  • Provides detection, containment, and remediation via People, Processes, technology.
  • facilities where an organization asset’s, including applications, databases,servers, networks, desktops, and other endpoints are monitored.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Centric SOC

A
  • proactively hunts for threats on the network.

* 24/7 hunting via Security data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compliance-Based SOC

A

• Focuses on the company’s Security as it relates to Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operational-based SOC

A

• Focuses on maintaining the operational integrity and functionality of the security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IT Asset Management

A

• collecting inventory, financial, and contractual data to manage the IT asset throughout its life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Configuration management

A

Establishing and maintaining consistency of a products performance, functional requirements, and design throughout the products life cycle.

17
Q

Patch management

A

Acquiring, testing, and installing of patches or code changes to the IT systems.

18
Q

Vulnerability Management

A

Identifying, classifying, remediating, and mitigating Vulnerabilities in Software, firmware, and hardware.

19
Q

MDM

A

Mobile Device Management

• monitors, manage, and secure employees mobile devices.

20
Q

COBIT

A
  • Good practice framework
  • COBIT Provides controls over information technology and organizes them around a logical framework of IT-related processes.
21
Q

ISO/IEC 27002:2013

A

Provide general guidance on the commonly accepted goals of information security management.
• Requirements are identified by a risk assessment
• Combined with COBIT to: Manage IT related Risk, Enforce Network Security Compliance, Fulfill audit Requirements, Satisfy needs for corporate governance and Internal Control.