Scor Information Security concepts Flashcards
These controls are aimed at preventing the threat from encountering the vulnerability. Examples are firewalls, physical locks, and security policies.
Preventive
These controls identify that the threat has entered the network or system. Examples are log monitoring and correlation, IPSs, and surveillance cameras. Note that by detecting a threat with IPS, it is also detective.
detective
These controls are aimed at mitigating or lessening the effects of the threat that is manifested. Examples are virus cleaning procedures or IPS signature updates after a worm outbreak.
corrective
These controls are aimed at putting a system back into production after an incident. Most disaster recovery activities fall into this category, although it is often considered a subset of corrective controls.
Recovery
These controls are aimed at discouraging security violations. These controls can be seen as a subset of preventive controls. Examples are signage (“Keep Out” type visuals and policies) or the mere presence of controls such as surveillance cameras.
Deterrent
CVSS
Common vulnerabilities scoring system
How do you calculate risk ?
Threats x Vulnerabilities x Impact = Risk
What is a Threat source ?
The intent and method that intentional exploits a vulnerability
What is a Threat ?
A threat is the potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
What is Impact ?
Impact is the damage that is caused by the threat.
Quantitative risk assessment ?
Quantitative risk assessment involves trying to map a dollar amount to each specific risk,
qualitative risk assessment ?
involves assigning a risk level such as low, medium, or high to each specific risk.
What is business risk ?
Business rick is varys but is the risk that a business incurs merely as part of doing business.
What is Data Risk ?
the risk of corruption or disclosure of important company data
What is Systems risk ?
The likelihood that a company information system is not adequately protected from damage, loss, or compromise. An example is a company storing important files in a room prone to flooding.
The process that balances the operational and economic costs of protective measures and the achieved gains in mission capability by protecting the IT systems and data that support their organizations’ missions.
Risk Management
a common option when the cost of other risk management options such as avoidance may outweigh the cost of the risk itself.
Risk acceptance
the action that avoids any exposure to the risk. Risk avoidance is usually the most expensive risk mitigation option.
Risk avoidance
limits a company’s risk exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance. It is the most used risk mitigation strategy.
Risk limitation
the transference of risk to a willing third party (for example, an insurance company).
Risk transfer
If an engineering server’s risk of being hacked is assigned a risk level of very high, which assessment strategy is being used?
quantitative
qualitative
impact
discretionary
non-discretionary
Mandatory
qualitative