Section 4: Security of Networks, Systems, Application and Data Flashcards

1
Q

Risk is the possibility of loss of a digital (a) ___ resulting from a (b) ___ exploiting a (c) ___.

A

a. asset
b. threat
c. vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of doing an analysis of the risk attributes (i.e. asset, exploit, vulnerability) to determine an organization’s particular risk.

A

Cyberrisk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three most common inputs of a cyberrisk assessment?

A
  1. Asset identification
  2. Threat assessment
  3. Vulnerability assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Select all that apply. Information used to estimate impact and likelihood usually comes from:

a. Past experience or data and records
b. Reliable practices, international standards or guidelines
c. Market research and analysis
d. Experiments and prototypes
e. Recent management analysis
f. Economic, engineering or other models
g. Specialist and expert advice
h. Industry report

A
  1. Past experience or data and records
  2. Reliable practices, international standards or guidelines
  3. Market research and analysis
  4. Experiments and prototypes
  5. Economic, engineering or other models
  6. Specialist and expert advice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three types of risk assessment orientations?

A
  1. Asset orientation
    - Important assets are defined first, and then potential threats to those assets are analyzed. Vulnerabilities are identified that may be exploited to access the asset.
  2. Threat orientation
    - Potential threats are determined first, and then threat scenarios are developed. Based on the scenarios, vulnerabilities and assets of interest to the adversary are determined in relation to the threat.
  3. Vulnerability
    - Vulnerabilities and deficiencies are identified first, then the exposed assets, and then the threat events that could be taken advantage of are determined.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the types of risk response strategy?

A
  1. Risk reduction
  2. Risk avoidance
  3. Risk transfer or sharing
  4. Risk acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of risk response strategy where the implementation of controls or countermeasures to reduce the likelihood or impact of a risk to a level within the organization’s risk tolerance

A

Risk reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of risk response strategy through non-participation in an activity or business

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An example of this risk response strategy is purchase of insurance or availment of a third-party’s services

A

Risk transfer or sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of risk response strategy where the organization assumes the risk and absorbs the loss

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: The results of risk assessments need to be evaluated in terms of the organization’s mission, risk tolerance, budgets and other resources, and cost of asset allocation.

A

False: The results of risk assessments need to be evaluated in terms of the organization’s mission, risk tolerance, budgets and other resources, and cost of MITIGATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Risk assessment results can be used to communicate the risk decisions and expectations of management throughout the organization through policies and procedures.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two most common techniques of identifying vulnerabilities:

A
  1. Vulnerability scaning

2. Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of using proprietary or open source tools to search for known vulnerabilities

A

Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An exploitable weakness that results in a loss

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The method used to take advantage of a vulnerability

A

Exploit

17
Q

What are the common types of vulnerabilities?

A
  1. Technical
    - errors in design, implementation, placement, or configuration
  2. Process
    - errors in operation
  3. Organizational
    - errors in management, decision, planning or from ignorance

Emergent
- interactions between, or changes in, environments