Risk Management Concepts Flashcards

1
Q

Risk Vector

A

Payment processing - Human resources - Emergency.
-Sensitive data - do we know what we have and where it is?
- Third-party access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Risk Vectors

A

Access control vestibules (mantraps)
Server room access
Limit USB bootable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Management Frameworks (RMFs)

A

Center for Internet Security (CIS)- cybersecurity best practices.
NIST Risk Management Framework (RMF)/Cybersecuirty Framework (CSF) - Cybersecurity risk management.
International Organization for Electrotechnical Commission (ISO/IEC) - 27001/27002/ 27701/31000 - IT systems and information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Financial RMFs

A

Statement on standards for attestation engagements system and organization controls (SSAE SOC 2)
- Financial statement integrity
- Internal controls
- Type I and Type II.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RMFs

A

NIST Special Publication (SP) 800-30, Rev. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Privacy Regulations and Standards
General Data Protection regulation (GDPR)

A

Protects EU citizens private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

Protect American patient medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

Protect cardholder information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Typers of Security Policies

A
  • Acceptable use policy (AUP) * E-mail, social media, web browsing
  • Resources access policies * App or file access.
  • Account policies * Account hardening.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Controls:
Solution that mitigates threats. Example: malware scanner mitigates malware infections
Implemented differently based platform/vendor/user. Network infrastructure devices. (switches, routers, firewalls)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Control Categories:

A

Managerial/administrative - what should be done? employee background checks.

operational - how often must we do it? periodic review of security policies

Technical - how exactly will we do it? firewall rule configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Control Types

A

Physical - Access control vestibule (mantrap)

Detective - Log analysis

Corrective - Patching known vulnerabilities.

Deterrent - Device logon warning banners

Compensating - Network isolation for internet of things (loT) devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are cloud security control documents?

A

Cloud Security Alliance (CSA) - Cloud Controls Matrix (CCM)

Payment Card Industry Data Security Standard (PCI DSS) - Security controls must be in place to be compliant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Risk Examples?

A

Risk - theft of online banking credentials.

Attack Vectors - spoofed e-mail message with a link to spoofed website tricking an end user

Mitigation through Security Controls - User security awareness. Antivirus software, spam filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Assessments and Treatments

A

Risk Assessment - Prioritization of threats against assets and determining what to do about it. Applicable to: Entire organization. - a single project or department.
Targets: Servers, Legacy systems, Intellectual property (IP), Software Licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Risk Assessment Process?

A
  1. Risk Awareness - Cybersecurity intelligence sources.
  2. Evaluate Security Controls - Inherent (current) and residual risk.
  3. Implement Security Controls
  4. Periodic Review
17
Q

What Are Risk Types?

A

Environmental Flood, & Hurricane
Person-Made- Riots, terrorism, sabotage
Internal - Malicious insider, malware infections.
External - Distributed denial of service (DDoS)

18
Q

What Are Risk Treatments?

A

Mitigation/Reduction - security controls are proactively put in place before undertaking the risk.

Transference/Sharing - some risk is transferred to a third party in exchange for payment. - example cybersecurity insurance

Avoidance - avoid an activity because the risks outweigh potential gains.

Acceptance - the current level of risk is acceptable. The risk falls within the organization’s risk appetite.