Risks Management Flashcards

1
Q

Security Policy Framework Levels

A

Policies
Standards
Guidelines
Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Factors

A

Likelihood/probability

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Assessment Methods

A

Qualitative

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define an AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AV Assessment Methods

A

Original
Depreciated
Replacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the EF

A

Exposure Factor; percent of asset effected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define SLE

A

Single Loss Expectancy; AV * EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ARO

A

Annualized Rate of Occurrence; likely number of occurrences per a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ALE

A

Annualized Loss Expectancy; ALE = SLE * ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define MTTF

A

Mean Time to Failure, for non replaceable components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define MTBF

A

Mean Time Between Failures, for replaceable components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define MTTR

A

Mean Time To Repair, average restoration time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risks Response Types

A

Avoidance
Transference
Mitigation/Deterrence
Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Register Components

A
Description
Categorization
Probability
Impact
Mitigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Assessment Sources

A
Vulnerability Scans
Penetration Test
Audits
OS Threat Intelligence
Consulting/Vendor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Vendor Agreements

A

SLR/SLA
MOU/MOA
BPA/BPO
ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define SLR

A

Service-Level Agreement; outlines service providers commitment to client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define MOU/MOA

A

Memorandum of Understanding/Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define ISA

A

Interconnection Service Agreement; joins networks outlining technical and security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Personnel Risk Management Key Principles

A

Need to Know
Least Privilege
Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define a BCP

A

Business Continuity Planning; focus on maintaining availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define a BIA

A

Business Impact Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA Risk Concerns

A

Safety
Financial
Reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define High Availability

A

Multiple-systems for same purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fault Tolerance Methods

A

Power Supply

Memory Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Describe RAID O

A

Striping
Performance, no Redundancy
1 or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Describe RAID 1

A

Mirroring
Redundancy, low performance
2 or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe RAID 5

A

Striping with Parity
Performance and Redundancy
3 or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe RAID 6

A

Striping with Double Parity

4 or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe RAID 10 (also called RAID 1 + 0/0 + 1)

A

Striping and Mirroring

4 or more disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define RTO

A

Recover Time Objective, goal recovery time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define RPO

A

Recovery Point Objective, restoration point to return to after an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Backup Types

A

Full
Differential
Incremental
Snapshot

35
Q

Describe Full Backups

A

Backup everything;
Slow backup speed
Fast restoration speed

36
Q

Describe Differential Backups

A

Backup changes since last full;
Medium backup speed
Medium restoration speed

37
Q

Describe Incremental Backups

A

Backup changes since last full or incremental;
Fast backup speed
Slowest restoration speed

38
Q

Define a system Snapshot

A

Capture disk image at a moment in time
Less storage space requirements
Quick backups

39
Q

Grandfather-Father-Son Backup Media Rotation Method

A

4 devices backup daily, 1 per a day Monday-Thursday
4 devices backup weekly, 1 per a week for 4 weeks
4 devices backup monthly, 1 per a month for 4 months

40
Q

Define 3-2-1 Backup Rule

A

2 Backups on site

1 Backup off-site

41
Q

Alternate Processing Facility Types

A

Hot
Cold
Warm

42
Q

Describe a Hot Site

A

Fully operational
Quickest restoration (hrs)
Expensive

43
Q

Describe a Cold Site

A

Empty facility
Slowest restoration (weeks)
Least expensive

44
Q

Describe a Warm Site

A

Hardware and Software ready
Medium restoration speed (days)
Medium expenses

45
Q

Define Alternate Business Processes

A

Utilizing alternative methods to accomplish same business purpose

46
Q

Backup Site Location Considerations

A

Close enough for relocation of employees
Far enough to not be impacted by same disaster
Ease of access
Away from other industrial facilities
Data sovereignty (only applies to location of storage)

47
Q

Disaster Response Plan Testing Methods

A
Read through
Walk through
Simulation
Parallel Test
Full Interruption
48
Q

Define CIRT

A

Cyber Incident Response Team

49
Q

CIRT Members

A
Management
Information Security
Subject Matter Experts
Legal
Public Affairs
HR
Finance
50
Q

Evidence Types

A

Real/Physical
Documentary
Testimonial

51
Q

Types of Testimonial Evidence

A

Direct, by first degree observation

Expert Opinion

52
Q

Define Hearsay

A

Testimonial evidence not given from the first person degree (i.e. “I heard someone else say”)

53
Q

Documentary Evidence Considerations

A

Authenticated
Best available
Parole Evidence

54
Q

Define Best Available Evidence

A

Original or closest to the original evidence

55
Q

Define Parole Evidence Rule

A

Assumes documentary evidence is entire and final

56
Q

Digital Forensic Order of Volatility

A

Cache, registers
ARP Cache, routing table, memory, kernel statistics, process table
Temporary files
Disks
Monitoring data and remote logs
Physical configuration and network topology
Archived media

57
Q

Purpose of Write Blockers

A

Intercept/prevent request to alter evidence

58
Q

Purpose of Hashing Collected Evidence

A

Compare later hashes with initial for data integrity

59
Q

Storage Bag Labeling Criteria

A

Name
Date and Time
Contents
Tamper Seal

60
Q

Data Owner’s Role

A

administrative control and has been officially designated as accountable for a specific information asset dataset

61
Q

Data Steward’s Role

A

Handle data governance and policy on behalf of the Data Owner

62
Q

Data Custodian’s Role

A

technical control over an information asset dataset

63
Q

Define PTA

A

Privacy Threshold Analysis, determine necessity for privacy controls

64
Q

Define PIA

A

Privacy Impact Analysis, evaluate sufficiency of privacy controls

65
Q

Adverse Background Check Notification PRocess

A

Investigation
Pre-adverse notification
Employee Response

66
Q

Incident Response Phases

A
Preparation
Identification
Containment
Investigation
Eradication
Recovery
Follow Up
67
Q

Uses of Captive Portals

A

Monitor/limit Network Activity
User agreements
Branding

68
Q

Insider Protection Methods

A

Content and email filter

Strong security policies

69
Q

Government Information Classification Standards

A

Top Secret- “exceptionally grave damage”
Secret- “serious damage”
Confidential- “damage”
Unclassified- available for general use

70
Q

Define Private Information

A

Information relating to an individual (i.e. PII, PHI)

71
Q

ISO 27001 Information Classification Standards

A

Confidential (top confidentiality level)
Restricted (medium confidentiality level)
Internal use (lowest level of confidentiality)
Public (everyone can see the information)

72
Q

Least Effective Means of Purging Media

A

Degaussing

73
Q

Define Security Policy

A

High-level, general statement about role of security

74
Q

Define Standard

A

Legal, industry, or best business practices

75
Q

Use of Code Escrow

A

Protect against vendor lack of support in the event they go out of business

76
Q

Network Protection Steps

A
ID and document user access permissions
ID high-value assets
Document trust boundaries
ID choke points on the network
Segregate and isolate the network
Isolate server functions
Physically secure high-value systems
77
Q

Memory Dump Methods

A

Save and extract the page file

Save contents of physical RAM

78
Q

Forensic Cloning Method

A

bit-level cloning

79
Q

Instant Messaging Vulnerability

A

Lack of encryption

80
Q

Define the Delphi Method

A

anonymous survey to determine value of an asset

81
Q

Define Two-Man Control

A

Tasks which require dual custody due to sensitivity

82
Q

Backup Data Loss Protection Method

A

Test restoration procedures

83
Q

Purpose of an Archive Bit

A

Indicates whether a file has been modified (set if modified)