Risk Management Flashcards
What is the CIA of Security?
Confidentiality, Integrity, Availability
Which element of the CIA of Security is the goal of keeping data secret from anyone who doesn’t have the need or the right to access that data?
Confidentiality
Which element of CIA of Security ensures the data and systems stays in an unaltered state when being transferred, received?
Integrity
Which element of CIA of Security ensures that systems and data are available to users when needed?
Availability
What is the act of keeping track of things that on such as who has been logging in, who has made changes to something, etc?
Auditing and Accountability
A user can’t deny that they have performed a particular action
Non-Repudiation
What are the people and organizations that actually do the attacks called?
Threat Actors
Which threat actor is known for trivial attacks due to lack of knowledge?
Script Kiddies
Which threat actor is motivated by intent to make a public social statement?
Hacktivist
What is the motivation of Nation states and advanced persistent threat (APT) threat actors?
Intelligence
Who is someone inside the company that has information to gain access that can be used as an attack?
Insider
the potential to harm organizations, people, IT equipment, etc.
Risk
Provides benefits to the organizations; equipment or people
Assets
Weakness that allows an asset to be exploited
vulnerabilities
A discovered action that exploits a vulnerability’s potential to do harm to an asset
threat
What defines the level of certainty that something is going to happen?
Likelihood
What is the actual harm caused by a threat?
Impact
an outside party looks for vulnerabilities and reports it
Penetration (pen) testing
effort to reduce impact of a risk
mitigation
offload some of the likelihood and risk on a third party
risk transference
reach a point where the likelihood and impact is so high that i simply don’t want to do deal with it
risk acceptance
What is the workflow or methodology process that helps security professionals deal with risk management?
Framework
What are two examples of a Risk management framework
NIST Risk Management Framework, ISACA Risk IT Framework
What is the threshold value to verify expected throughput or action?
Benchmark
manufacturers’ security guides to setup and review configurations
platform or security guide
What is a general purpose guide in terms of risk assessment?
a list of security controls
What are the three types of security controls?
Administrative (management), Technical, Physical
What are some examples of Administrative security control?
laws, policies, guidelines, best practices
What are some examples of Technical security control?
computer stuff, firewalls, password links, authentication, encryption
What are some examples of Physical security control?
gates, guards, keys, man traps