Security and Risk Management Domain Flashcards

1
Q

Administrative Controls

A

Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Annualized Rate of Occurrence (ARO)

A

An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arms Export Control Act of 1976

A

Authorizes the President to designate those items that shall be considered as defense articles and defense services and control their import and the export.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The principle that ensures that information is available and accessible to users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Breach

A

An incident that results in the disclosure or potential exposure of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compensating Controls

A

Controls that substitute for the loss of primary controls and mitigate risk down to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compliance

A

Actions that ensure behavior that complies with established rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality

A

Supports the principle of “least privilege” by providing that only authorized individuals, processes, or systems should have access to information on a need-to-know basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Copyright

A

Covers the expression of ideas rather than the ideas themselves; it usually protects artistic property such as writing, recordings, databases, and computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective: Controls

A

Controls implemented to remedy circumstance, mitigate damage, or restore controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Disclosure

A

A breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detective Controls

A

Controls designed to signal a warning when a security control has been breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deterrent Controls

A

Controls designed to discourage people from violating security directives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Directive Controls

A

Controls designed to specify acceptable rules of behavior within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Due Care

A

The care a “reasonable person” would exercise under given circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Due Diligence

A

Is similar to due care with the exception that it is a pre-emptive measure made to avoid harm to other persons or their property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Enterprise Risk Management

A

A process designed to identify potential events that may affect the entity, manage risk so it is within its risk appetite, and provide reasonable assurance regarding the achievement of entity objectives.

18
Q

Export Administration Act of 1979

A

Authorized the President to regulate exports of civilian goods and technologies that have military applications.

19
Q

Governance

A

Ensures the business focuses on core activities, clarifies who in the organization has the authority to make decisions, determines accountability for actions and responsibility for outcomes, and addresses how expected performance will be evaluated.

20
Q

Incident

A

A security event that compromises the confidentiality, integrity, or availability of an information asset.

21
Q

Integrity

A

Comes in two forms; making sure that information is processed correctly and not modified by unauthorized persons, and protecting information as it transits a network.

22
Q

Information Security Officer

A

Accountable for ensuring the protection of all of the business information assets from intentional and unintentional loss, disclosure, alteration, destruction, and unavailability.

23
Q

Least Privilege

A

Granting users only the accesses that are required to perform their job functions.

24
Q

Logical (Technical) Controls

A

Electronic hardware and software solutions implemented to control access to information and information networks.

25
Q

Patent

A

Protects novel, useful, and nonobvious inventions.

26
Q

Physical Controls

A

Controls to protect the organization’s people and physical environment, such as locks, fire management, gates, and guards; physical controls may be called “operational controls” in some contexts.

27
Q

Preventive Controls

A

Controls implemented to prevent a security incident or information breach.

28
Q

Recovery Controls

A

Controls implemented to restore conditions to normal after a security incident.

29
Q

Recovery Time Objective (RTO)

A

How quickly you need to have that application’s information available after downtime has occurred.

30
Q

Recovery Point Objective (RPO)

A

The point in time to which data must be restored in order to successfully resume processing.

31
Q

Risk

A
  1. A combination of the probability of an event and its consequence (ISO 27000)
  2. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.(RFC 2828)
32
Q

Risk Acceptance

A

The practice of accepting certain risk(s), typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way.

33
Q

Risk Avoidance

A

The practice of coming up with alternatives so that the risk in question is not realized.

34
Q

Risk Mitigation

A

The practice of the elimination of or the significant decrease in the level of risk presented.

35
Q

Risk Transfer

A

The practice of passing on the risk in question to another entity, such as an insurance company.

36
Q

Risk Management

A

A systematic process for identifying, analyzing, evaluating, remedying, and monitoring risk.

37
Q

Single Loss Expectancy (SLE)

A

Defined as the difference between the original value and the remaining value of an asset after a single exploit.

38
Q

Single Points of Failure (SPOF)

A

Any single input to a process that, if missing, would cause the process or several processes to be unable to function.

39
Q

Trademark

A

Any word, name, symbol, color, sound, product shape, device, or combination of these that is used to identify goods and distinguish them from those made or sold by others.

40
Q

Trade Secret

A

Proprietary business or technical information, processes, designs, practices, etc., that are confidential and critical to the business.

41
Q

Vulnerability Assessment

A

Determines the potential impact of disruptive events on the organization’s business processes.

42
Q

Wassenaar Arrangement

A

Established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilizing accumulations.