Security & Risk Management Flashcards

1
Q

The Officer who is Accountable for ensuring the protection of all of the business information assets from intentional & unintentional loss, disclosure, alteration, destruction, & unavailability

A

Information Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls designed to discourage people from violating security directives.

A

Deterrent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Controls designed to signal a warning when a security control has been breached.

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic hardware & software solutions implemented to control access to information & information networks

A

Logical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The practice of coming up with alternatives so that the risk in question is not realized.

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The practice of accepting certain risk typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Combination of the probability of an event & its consequences.
  2. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. (RFC 2828)
A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Controls implemented to prevent a security incident or information breach

A

Preventative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls to protect the organization’s people & physical environment, such as locks, fire management, gates, & guards; physical controls may be called “operational controls” in some contexts

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Comes in 2 forms; making sure information is processed correctly & not modified by unauthorized persons, & protecting information as it transits

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Procedures implemented to define the roles, responsibilities, policies, & administrative functions needed to manage the control environment

A

Administrative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The principle that ensures that information is available & accessible to users when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An incident that results in the disclosure or potential exposure of data

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The practice of the elimination of or the significant decrease in the level of risk presented

A

Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determines the potential impact of disruptive events on the organization’s business processes

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls implemented to remedy circumstance, mitigate damage, or restore controls

A

Corrective Controls

17
Q

Supports the principle of “least privilege” by providing only authorized individuals, processes, or systems should have access to information on a need to know basis

A

Confidentiality

18
Q

A breach for which it was confirmed that data was actually disclosed to an unauthorized party

A

Data Disclosure

19
Q

Controls implemented to restore conditions to normal after a security

A

Recovery Controls

20
Q

The practice of passing on the risk in question to another entity, such as an insurance company

A

Risk Transfer

21
Q

Any single input to a process that, if missing, would cause the process or several processes to be unable to function

A

Single Point of Failure

22
Q

A systematic process for identifying, analyzing, evaluating, remedying, & monitoring risk

A

Risk Management

23
Q

Controls designed to specify acceptable rules of behavior within an organization

A

Directive Controls

24
Q

A security event that compromises the confidentiality, integrity, or availability of an information asset

A

Incident