Security Management and Risk Assessment Flashcards

1
Q

IT Security Management

A

A process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT Security Functions include

A

determining organization IT security objectives, strategies, and policies

Determining organizational IT security requirements

Identifying and analyzing security threats to IT assets within the organization

Identifying and analyzing risks

Specifying appropriate safeguards

Monitoring the implementation and operation of safeguards that are necessary in order to cost effectively protect the information and services within the organization

Developing and implementing a security awareness program

Detecting and reacting to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four approaches to identifying and mitigating risks

A

Baseline approach

Informal approach

Detailed risk analysis

Combined analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseline Approach to identifying and mitigating risks

A

Aims to implement a basic general level of security controls on systems using baseline documents, codes of practice, and industry best practice

Advantages:

  • -does not require expenditure of additional resources in conducting a more formal risk assessment
  • Same measurements can be replicated over a range of systems

Disadvantage:
no special consideration is given to variations in the organization’s risk exposure based on who they are and how their systems are used

Goal:
implement generally agreed controls to provide protection against the most common threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Informal approach to identifying and mitigating risks

A

Involves conducting some form of informal, pragmatic risk analysis for organization’s IT systems. No formal structured process

Advantage:

  • -individuals performing the analysis require no additional skills
  • -assessment performed quickly and cheaply
  • -judgments made about specific vulnerabilities and risks (unlike baseline approach)

Disadvantage:

  • -risks may not be considered appropriately, leaving org vulnerable
  • -insufficient justification for suggested controls
  • -inconsistent results over time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Details risk analysis approach for identifying and mitigating risks

A

Most comprehensive approach

Greatest degree of assurance

Stages:

  • -Establish the context or system characterization (define risk appetite)
  • -Asset Identification
  • -Identification of threats, risks, and vulnerabilities
  • -Threat identificaiton
  • -analyze likelihood of the risk
  • -analyze existing controls
  • -determine consequences
    • determine resulting risk to org
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Combined approach for identifying and mitigating risks

A

Aims to provide reasonable levels of protection as quickly as possible, and then examine and adjust protection controls deployed on key systems over time

Stages:

  1. Start with implementation of suitable baseline security recommendations
  2. systems either exposed to high risk levels or critical to business objectives are identified in the high level risk assessment.
  3. decision made to conduct informal risk assessment on key systems, with aim of relatively quickly tailoring controls to more accurately reflect their requirements
  4. ordered process of performing detailed risk analyses of these systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Managing Security

A

Technical controls (authentication, access control etc.) are used to reduce the risk of attacks on valuable assets.

Legal and compliance drivers for cyber security
–Financial and health data

What technical controls should be deployed?

  • -Must understand risks posed by threats
  • -Costs and benefits of security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Challenges

A

What assets are under risk?

What are the threats and how serious is the risk posed by them?

Likelihood of successful attack and its impact

What technological solutions/controls exist to counter threats?

How can we address risk in a cost-effective manner?
–Cost is less than reduction in risk

How do we understand people and process aspects of cyber security management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Management controls

A

focus on security policies, planning, guidelines, and standards that influence the selection of operational and technical controls to reduce the risk of loss and to protect the organization’s mission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operational controls

A

Address the correct implementation and use of security policies and standards, ensuring consistency in security operations and correcting identified operational deficiencies.

These controls relate to mechanisms and procedures that are primarily implemented by people rather than systems

They are used to improve the security of the system or group of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical controls

A

involve the correct use of hardware and software security capabilities in systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control classes include

A

Supportive controls

Preventative controls

Detection and recovery controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST06 suggests adjustments may be needed for these

A

Technology

Common controls

Public access system

Infrastructure controls

Scalability issues

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Planning: Controls

A

Identity and access management (IAM)

  • -Credentialing, account creation and deletion
  • -Password policies

Network and host defenses

  • -Firewalls, IDS, IPS
  • -Anti-virus

VPN and BYOD

Vulnerability patching

User awareness and education
–Phishing attack awareness (Phishme)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Planning: Security Policy

A

High level articulation of security objectives and goals
–Legal, business or regulatory rationale

Do’s and don’ts for users

  • -Password length
  • -Web and email policies
  • -Response to security events

Address prevention, detection, response and remediation as it concerns/impacts users

17
Q

Cyber Risk Assessment

A

Investments in cyber security are driven by risk and how certain controls may reduce it

Some risk will always remain

How can risk be assessed?

18
Q

Quantifying Cyber Risk

A

Risk exposure = Prob. [Adverse securityevent] * Impact [ adverse event]

19
Q

Managing Cyber Risk

A

Impact
–Expected loss (reputational,recovery and response, legal, loss of business etc.)

Risk management

  • -Accept, transfer (insurance) and reduce
  • -Reduction via technology solutions, education and awareness training
20
Q

Security Planning and Management

A

Values at risk
–Assets, reputation etc.

Threats and attack vectors

Plan, implement and manage

  • -Deploy appropriate controls
  • -Empower people and hold them responsible
  • -Plan for response and remediation (do not be surprised)
  • -User awareness

Understand and proactively address risk

21
Q

Security compliance

A

An audit process to review the organization’s security processes

Goal is to verify compliance with security plan