Risk Management Flashcards
Looking to define threats specific to your infrastructure
Threat Assessment
Security Control Function
Recognized an actors threat
Detective
Security Control Function
Mitigates the impact of manifested threat
Corrective
CIA
Confidentiality
Integrity
Availability
Organizing Data
-Limited to authorized viewing as agreed on by the parties involved
Confidential Data
Differential Backup
Everyday you’d make a backup of any changes since the full backup - to do a full system recovery you’d need the original backup plus the last differential backup made
Outside company checks your vulnerabilities by trying to get in but not doing anything harmful
Penetration(Pen) Testing
Security Policies
-Define the importance or nature of the data
Data Sensitivity and Classification Policy
Control actions towards IT security
- laws
- policies
- guidelines
- best practices
Administrative Controls
Security Control Function
Deters the actor from attempting the threat
Deterrent
ARO
Annualized Rate of Occurence
Data User Roles
-Set policy on data and incident response actions
Executive User
Control Actions IT systems make toward IT Security
- computer stuff
- firewalls
- password links
- authentication
- encryptions
Technical Controls
Role Based Data Controls
-Read only access but can look at all business data
Executive User
Threats x Vulnerability
Risk
Risk Response - offload some of the impact to 3rd party
Risk transference
In-house document of how they store data
Privacy Threshold Assessment (PTA)
Security Policies
-Defines what a person can or can not do when using company assets
Acceptable Use Policy
Use a variety of physical, administrative, and technical controls to have good…
Defense in Depth
Data User Roles
-Complete control over data and could delete everything - sets permissions
System Administrator
Structural threat
Physical system failure
Defense in Depth
-different types of controls
Diversity
Organizing Data
-Health Insurance Portability and Accounting Act
HIPAA
Private Health Information (PHI)
3 Security Controls
Administrative/Techincal/Physical
Initiates a threat
Threat Agent
Data Roles
-Person who is in charge of ensuring data adheres to privacy policies and procedures
Privacy Officer
Security Policies
- How you maintain equipment
- How you borrow equipment
Care and Use of Equipment Policy
Apply to infrastructure to protect and remediate current and potential problems
Security Control
Data Roles
-Maintain the accuracy and integrity of the data
Steward/Custodian
Incremental Backup
Everyday you’d make a backup of any changes since the last incremental backup - to do a full system recovery you’d need the original backup plus all the incremental backups made since
Scan that shows vulnerabilities
NESSUS
PIA
Privacy Impact Assessment
Data User Roles
-Assigned standard permissions to complete tasks
User
Accidental threat
Someone innocently corrupts or damages something
Security Policies
- How you deal with passwords
- Password recovery/retention/reuse/ect.
Password Policy
Role Based Data Controls
- Defines the security of the data
- Defines the protection of data
- Works with system owner to protect data
- Defines access to the data
Data Owner
PII
Personally Identifiable Information
Security Control Function
Deters the actor from performing the threat
Preventative
Security Policies
- How to get access to data or resources
- What kind of data do users have access to
Access Control Policy
What does this help with?
-Separation of duties?
Requires dual execution
Data User Roles
-Increased access and control relative to a user
Privileged User
Defense in Depth
-same type of control but many of them as backups
Redundancy
Agreement used by Government and Private Sector…
- Service to be provided
- Minimum up-time
- Response time
- Start and end dates
Service Level Agreement (SLA)
Threat Actors - Motivation is intelligence
Nation States/Advanced Persistent Threat(APT)
Documents that define how to do something
Policies
A Memorandum of Understanding/Agreement is a….
Notice that specifies the responsibilities of each party and defines the terms of the agreement
Qualitative likelihood
Perceived