Risk Management . Flashcards
Risks are the combination of a ______ and a corresponding _______.
- Threat
- Vulnerability
What two formulas does Quantitative risk assessments use?
SingleLossExpectancy = AssetValue x ExposureFactor
OR
AnnualizedLossExpectancy = AnnualizedRateOfOccurence x SLE
What four things are included in a response to a risk & how do you implement these responses?
- AVOID risks by changing business practices.
- MITIGATE risks by implementing controls.
- ACCEPT risks and continue operations.
- TRANSFER risks through insurance or contract.
What are the 8 major categories of security controls?
- Detterent Control
- Preventive Control
- Detective Control
- Corrective Control
- Compensating Control
- Technical Control
- Administrative Control
- Physical Control
This Major Security Control…
Discourages an adversary from attempting a violation of security.
Deterrent Control
This Major Security Control…
Stops an adversary from violating security.
Preventive Control
This Major Security Control…
Identifies potential violations of security.
Detective Control
This Major Security Control…
Restores the original state after a violation of security.
Corrective Control
This Major Security Category…
Fills the gap left when it is not possible to implement a required control.
Compensating Control
This Major Security Control…
Uses technological means to meet a security objective.
Technical Control
This Major Security Control…
Uses policy, process, or procedure to meet a security objective.
Administrative Control
This Major Security Control…
Uses physical constraints to meet a security objective.
Physical Control
Personnel security principles include what?
- Need To Know
- Least Privilege
- Separation of Duties
- Two-Person Control
- Mandatory Vacations/ Job Rotation
This personnel security principle…
Requires a legitimate business need to accept information.
Need To Know
This personnel security principle…
Grants individuals the minimum necessary permissions to perform their jobs.
Least Privilege
This personnel security principle…
Blocks someone from having two sensitive privileges in combination.
Separation of Duties
This personnel security principle…
Requires two people to perform a sensitive activity.
Two-Person Control
This personnel security principle…
Seeks to prevent fraudulent activity by uncovering malfeasance.
Mandatory Vacations/ Job Rotation
Business continuity planning conducts a business ______ ______ and then implements controls designed to keep the business running during adverse circumstances.
impact assessment
Backups provide an important disaster recovery control (T/F)?
True!