Security and Risk Management Flashcards
Confidentiality
Keeping information and communications private and protecting them from unauthorized access.
Integrity
Ensuring that electronic data is accurate, without error, and without unauthorized modification.
Availability
Ensuring that systems operate continuously and that authorized persons can access data that they need.
Authenticity
Establishing the validity of a data transmission, message, or originator to prevent impersonation and require users to confirm their identities before they are allowed access to systems and resources.
Non-repudiation
In a communication, transaction, or similar exchange, providing both parties with proof that the transaction was completed so that neither party can later deny having completed the transaction.
CRAMM
CCTA Risk Analysis and Management Method
FMEA
Failure modes and effect analysis
FRAP
Facilitated Risk Analysis Process
OCTAVE
Operationally Critical Threat, Asset, and Vulnerability Evaluation
SOMAP
Security Officers Management and Analysis Project
ARO
Annualized Rate of Occurrence = event number/years
EF
Exposure factor = loss value / assets value (AV)
SLE
Single loss expectancy = EF * AV
ALE
Annualized loss expectancy (ALE) = ARO * SLE