Security Domain Flashcards

1
Q

What are the two primary purposes of the Health Insurance Portability and Accountability Act (HIPPA)?

A

Security and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What exists to alleviate the risk of certain threats by providing monetary compensation in the event those threats occur?

A

Insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the acronym SLE denote?

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which element of the CIA triad ensures that transferred data is not altered in transmission?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Of which control is enforcing mandatory vacation an example?

A

Administrative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What the purpose of a preventative control?

A

To prevent security incidents before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of control is required for detecting occurrences of risks?

A

Detective Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which organization has developed an ethics-related statement concerning the use of the Internet?

A

Internet Architecture Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for the process of identifying information assets and their associated threats, vulnerabilities, and potential risks?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which formula should you use to determine the Single Loss Expectancy (SLE) of an asset

A

Asset Value (AV) * Exposure Factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who should oversee the development of the information security policy?

A

An organization’s business operations manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which term refers to the processes and procedures that are followed to minimize the problems affecting the information systems?

A

Problem Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by the term enrollment time in a biometric system? pg 571

A

the time it takes to register the system by providing samples of a biometric characteristic (biometric factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Third-Party governance?

A

It is a system of oversight that may be mandated by law, regulation, industry standard, contractual obligation, or licensing requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Third-party governance focus on?

A

verifying compliance with stated security objectives, requirements, and regulations, and contractual obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The possibility that something could happen to damage, destroy, or disclose data or other resources is known as

A

Risk

17
Q

What is the primary goal of risk management?

A

reduce risk to an acceptable level

18
Q

The process by which the goals of risk management are achieved is known as

A

Risk analysis

19
Q

Prioritizing and comparing risk to losses require ___

A

Asset valuation

20
Q

What is the risk formula?

A

= threat * vulnerability

21
Q

What is Qualitative Risk Analysis?

A

is based on scenarios than calculations. Exact dollar figures are not assigned to possible losses; instead threats are ranked on a scale to evaluate their risks, costs, and effects. Such an analysis assists those responsible in creating proper risk management policies.

22
Q

Quantitative Risk Analysis

A

Results in concrete probability percentages.
The end result is a report that has dollar figures for levels of risk, potential loss, cost of countermeasures, and value of safeguards.

23
Q

What are the six steps of the risk management framework? (Figure 2.7 page 80)

A

Categorize, Select, Implement, Assess, Authorize, and Monitor

24
Q

What is the prerequisite to security training?

A

Awareness

25
Q

What is the annualized loss expectancy (ALE)

A

ALE is an element of quantitative risk analysis that represents the possible yearly cost of all instances of a specific realized threat against a specific asset.

26
Q

What is exposure factor?

A

An element of quantitative risk analysis that represents the cost associated with the single realized risk against a specific asset.

27
Q

What are the elements of risk analysis?

A
  1. Analyzing an environment for risks;
  2. Evaluating each threat event as to its likelihood of occurring and the damage it would cause,
  3. Assessing the cost of various countermeasures for each risk, and
  4. Creating a accost/benefit report for safeguards to present to upper management.
28
Q

How is the value of a safeguard to a company calculated?

A

ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard [(ALE1-ALE2)-ACS]

29
Q

When evaluating safeguards, what is the rule that should be followed in most cases?

A

The annual costs of safeguards should not exceed the expected annual cost of asset loss.

30
Q

ALE is calculated using the following formula:

A

ALE= SLE*ARO

31
Q

What is total risk?

A

It is the amount of risk an organization would face if no safeguards were implemented.

32
Q

What is the formula for total risk?

A

threats * vulnerabilities * asset value = total risk

33
Q

What is residual risk?

A

The risk that management has chosen to accept rather than mitigate.

34
Q

What are control gaps?

A

The difference between total risk and residual risk, which is the amount of risk that is reduced by implementing safeguards.

35
Q

Residual risk calculation formula:

A

total risk- control gaps = residual risks.

36
Q

What are 7-types of controls?

A
Compensating
Corrective
Detective
Deterrent
Directive
Preventive
Recovery
37
Q

Calculating Annualized Loss Expectancy with a Safeguard requires a new

A

EF and ARO specific to the safeguard

38
Q

Formula for Safeguard Cost/Benefit

A

ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard (ACS) = value of the safeguard to the company

39
Q

What are the five elements of Authentication, Authorization, and Accounting (AAA) services?

A
  1. Identification;
  2. Authentication;
  3. Authorization;
  4. Auditing; and
  5. Accounting